Industry Insight

Industry Insight

Phishing-resistant MFA shows great momentum

Today, Okta published its second Secure Sign-in Trends Report, our annual report into multi-factor authentication (MFA) use in the workplace. The report takes anonymized and aggregated data from Okta’s Workforce customers to answer some key questions: What sign-in methods offer the best mix of security and user experience?  Which methods are the…

Security Questions: Best Practices, Examples, and Ideas

Security questions are a common method of identity authentication—one you’ve probably encountered before. When creating an account or signing up for a service online, users will confidentially share the answers to secret questions with a provider.  Typically, these security questions and answers are used for self-service password recovery…

Decentralized Identity: The future of digital Identity management

Decentralized Identity is a methodology that allows individuals to securely control their digital Identity without relying on a central authority. The need for decentralized Identity Traditional Identity models do not protect user interests and can leave personal information vulnerable. Decentralized Identity helps close the gap on a growing list…

What Is SAML and How Does It Work?

SAML stands for Security Assertion Markup Language, an open standard that passes authorization credentials from identity providers (IdPs) to service providers (SPs). Put simply, it enables secure communication between applications and allows users to gain access with a single set of credentials. Before we can dive too deeply into what SAML is used…

DORA is coming. Are you ready? 

5 steps you need to take to be prepared for next year’s deadline DORA is set to transform the financial services sector by enhancing cybersecurity and operational resilience across the EU. Okta’s Stephen McDermid explains what DORA means for the finance sector and why many firms are turning to automation to manage the complex layers of regulation…

Tools for detecting and responding to potential threats post authentication

If a data breach happens at your organization,  you can’t afford to compromise on the speed and efficacy of your response. For the best possible defense against cybersecurity threats, security leaders need a comprehensive approach to Identity-powered security that supports risk mitigation in scenarios when would-be attackers have already exploited…

Secure device access: The missing key to your security strategy

Between work and home, how many devices are you using every day? The proliferation of portable devices has magnified the cybersecurity challenges facing organizations of all sizes.  For many businesses, the challenges of managing and securing IT assets have been amplified by “bring your own device” policies. As a result, IT organizations often no…

What Is single sign-on (SSO)?

Single sign-on (SSO) is an authentication tool that enables users to securely access multiple applications and services using one set of credentials, eliminating the need to remember different passwords for each service. In today’s remote work ecosystem, where employees rely on software-as-a-service (SaaS) applications like Slack, Google Workspace…

Archive