Adaptive MFA

Kickstart Amazon Bedrock with Auth0 by Okta

What’s the best way to bring generative AI to your products and services? If you’re lucky enough to have a few billion dollars lying around, your launch deadline is a handful of years away, and you have access to the world’s best artificial intelligence (AI) engineers, then you’re all good. You can create your own generative AI foundational model…

Customer Identity Cloud enhancements to prevent account takeover

Recapping features introduced under the Okta Secure Identity Commitment to safeguard our infrastructure, our customers, and our customers’ customers Identity is under attack — by ransomware groups, nation-state actors, malicious insiders, and other cybercriminals — and, in recent years, it has emerged as the primary enterprise security entry point…

How to choose the right MFA for your small business

TL;DR: How to right-size your MFA solution to do more with less. Key takeaways include: Understanding small business authentication and MFA factors Considerations including ease of use, cost-efficiency, pros and cons  Creating your MFA implementation plan   If you’re reading this you know that when attackers get control of the right identity,…

What Is Multi-Factor Authentication (MFA)?

MFA stands for multi-factor authentication, an identity verification method. MFA adds an extra layer of security on top of credentials like usernames and passwords. By doing so, it provides greater certainty that a user is who they claim to be before granting them access to an application, online account, or corporate network. MFA is a critical…

Advisory 2020-008: Mitigating the Risks of Copy-Paste Compromises

Australian Prime Minister Scott Morrison recently raised awareness of a state-based cyber attack that Australia is facing across all levels of government and the private sector. In response, the Australian Cyber Security Centre (ACSC) published an advisory on the nature of the attacks as well as guidance on how to mitigate these types of attacks…

Our Customers Are Tidying Up IAM—Here’s How

We’ll be the first to say that modern identity and access management (IAM) systems are complex. On the one hand, they need to be powerful enough to deal with multiple identity silos and application technologies. And on the other, they need to operate with legacy infrastructure. With the wrong system in place, this complexity can cost time and…

The Secret Features of Okta Access Gateway: Part 4: Anonymous Access

At Okta, we love to secure access to everything, from cloud apps, to consumer apps, to servers, and infrastructure—from a single platform. And that, of course, includes on-premises apps. In our new series The Secret Features of Okta Access Gateway, we’re going to explore some of the best secret features of Okta Access Gateway (OAG) to secure…

The Secret Features of Okta Access Gateway: Part 3: Maintenance Mode

At Okta, we love to secure access to everything, from cloud apps, to consumer apps, to servers, and infrastructure—from a single platform. And that, of course, includes on-premises apps. In our new series The Secret Features of Okta Access Gateway, we’re going to explore some of the best secret features of Okta Access Gateway (OAG) to secure…

Archive