Pride in Everything You Do: A Day in the Life with Nick Wood

June is a big month for Okta. It’s when we get the results of Gartner’s annual Magic Quadrant for Access Management, Worldwide (spoiler alert: we’re a Leader, again). It also marks Pride month for the LGBTQ+ community. In addition to “pride-i-fying” our social profiles, our employee resource group, Pride@Okta, helps the company come together to…

Taking a Risk-Based Approach to Biometrics

Biometric authentication — using the unique biological characteristics of an individual to verify their identity — has been around since the dawn of humankind. Think about it: humans use facial and voice recognition every day to identify each other. Signature recognition came about when the first contracts were originally created, and fingerprints…

Protecting Your Organization Against Privileged Attacks

In recent years, the threat of cyber attacks has grown steadily. Many large enterprises have suffered devastating attacks, despite having security resources in place. Why are so many falling prey to attacks? The answers are manifold, but one of the leading causes is the misuse and abuse of privileges, opening up an easy path for attackers to…

Okta for Good: Activating Changemakers

I think a lot about the unique position those of us in the corporate social impact field are in, and what a privilege it is to help others give back. I feel incredibly lucky to lead social impact work for a company like Okta, with an engaged ecosystem of employees, partners and customers who are all passionate about doing more for their…

Replace RSA SecurID with Modern MFA

Defense in depth, the coordinated use of multiple security layers to protect system and data integrity, is a multi-layered strategic approach which is deployed to minimize the risk of compromise. The basic premise is that if one security countermeasure is defeated, there is another to ensure your systems remain secure. MFA – Defense in Depth for…

What is ADFS?

Active Directory Federation Services (ADFS) is a Single Sign-On (SSO) solution created by Microsoft. As a component of Windows Server operating systems, it provides users with authenticated access to applications that are not capable of using Integrated Windows Authentication (IWA) through Active Directory (AD). Developed to provide flexibility,…

Identity in the News – Week of June 11

Selections from the top news items this week in the world of identity and application security. IDENTITY + THE CLOUD Why Do We Care So Much About Privacy? From The New Yorker: The reason you’ve been receiving a steady stream of privacy-policy updates from online services, some of which you may have forgotten you ever subscribed to, is that the…

I Snuck a Bad Apple into the Basket, and Nobody Noticed

Imagine the havoc a sophisticated threat actor could wreak by tricking a user into downloading and executing malicious code that current security products deem as safe. They can get access to personal data, financial details, or sensitive insider information. That scenario is precisely what could happen based on new research published today from…

Identity in the News – Week of June 4

Selections from the top news items this week in the world of identity and application security. Identity + the Cloud I followed the CEO of $6 billion Okta around and learned the secrets of a tech conference that landed President Obama as a speaker From Business Insider: Last week, the conference center at the Aria hotel in Las Vegas was abuzz with…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube