Industry Insight

Industry Insight

DORA is coming. Are you ready? 

5 steps you need to take to be prepared for next year’s deadline DORA is set to transform the financial services sector by enhancing cybersecurity and operational resilience across the EU. Okta’s Stephen McDermid explains what DORA means for the finance sector and why many firms are turning to automation to manage the complex layers of regulation…

Tools for detecting and responding to potential threats post authentication

If a data breach happens at your organization,  you can’t afford to compromise on the speed and efficacy of your response. For the best possible defense against cybersecurity threats, security leaders need a comprehensive approach to Identity-powered security that supports risk mitigation in scenarios when would-be attackers have already exploited…

Secure device access: The missing key to your security strategy

Between work and home, how many devices are you using every day? The proliferation of portable devices has magnified the cybersecurity challenges facing organizations of all sizes.  For many businesses, the challenges of managing and securing IT assets have been amplified by “bring your own device” policies. As a result, IT organizations often no…

SMBs at Work 2024: What apps make the SMB stack?

In our SMBs at Work 2024 report, we explore how SMBs navigate today’s dynamic app landscape. Powered by anonymized data from over 18,000 companies and how they adopt thousands of applications in the Okta Integration Network, the report details how today’s growing companies are using applications and setting trends. Small and midsize businesses …

Open banking regulation in North America: A guide

By allowing consumers to securely share their financial information with trusted third-party providers like personal finance apps, open banking unlocks the trifecta of positive customer experience: greater convenience, more financial insights, and hyper-personalized services that improve how consumers move, manage, and make money.     In the era…

Leveraging Identity to discover vulnerabilities and determine proper access

Robust Identity protection starts before attackers reach your digital front door.   Identity is the most common vector of attack for bad actors looking to improperly access sensitive information. Over 80% of breaches stem from some form of credential abuse, making the task of reliably authenticating Identity a core concern for security leaders in…

Archive