phishing resistance

Navigating credential and fraud risks: The phishing resistance authenticator effect

Image generated using DALL·E 2   This blog explores the robust security benefits of phishing-resistant authenticators, which can significantly bolster an organization’s cybersecurity measures beyond the scope of phishing attacks. The percentage of phishing-resistant authentications serves as a tangible indicator of an organization’s proactive use…

Tactical Identity Bridge Appliance: How the U.S. Government can extend Okta to the tactical edge

Many federal organizations are meeting cloud computing strategies for persistent access to information by leveraging software-as-a-service (SaaS) technology for their enterprise mission use cases. For the U.S. Department of Defense (DoD), enabling cloud innovation must support data to and from various environments. DoD’s mission capabilities are…

Archive