Industry Insight

Industry Insight

The Need for Phishing-Resistant Multi-Factor Authentication

This blog post is the first in a series of posts that focus on the growing incidence of credential phishing and how Okta can help organizations of all sizes in implementing phishing-resistant multi-factor authentication. Credential phishing, the practice of tricking users into revealing sensitive personal information such as authentication…

Winning Strategies for the Modern CMO

As a chief marketing officer, I’m obsessed with creating a great customer experience. From the moment someone discovers our brand, and hopefully continuing through a lifetime of loyalty, I want to build a unique, exceptional relationship with each of our customers.  That’s never been easy. But these days it’s more challenging than ever because the…

What Is Two-Factor Authentication (2FA)? 

Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network. Think of your most recent login…

5 Key Takeaways from Our 2021 State of Zero Trust Security Report

How important is it to implement Zero Trust? We asked over 600 business and security leaders across North America, Asia Pacific (APAC), Europe, the Middle East, and Africa (EMEA)—and the overwhelming consensus is that it has become crucial. With the unprecedented shift to remote work, the adoption of new digital products and services, and the…

Your Business Growth Depends on Customer Identity

A new era of business requires new methods for increasing revenue and accelerating business growth. The best way to do this? Leveraging modern technologies and tools. Providing customers with extraordinary digital experiences is more important than ever—and customer identity and access management (CIAM) is an essential component of this.  Today,…

Okta and AWS Partner to Secure EC2 Instances with the Okta Advanced Server Access Quick Start

Millions of companies – including many Okta customers – rely on Amazon Web Services (AWS) to power their businesses. According to 2020's Businesses@Work Report, AWS has risen steadily from sixth place five years ago to the second most popular cloud app used by Okta customers. As companies increasingly use AWS to power their infrastructure, they…

What Are the Benefits and Limitations of Multi-Cloud?

Organizations are increasingly deploying and implementing cloud services in an effort to reduce the cost and complexity of their infrastructure while accelerating their innovation levels. And this is typically a multi-pronged approach: 92% of enterprises have deployed a multi-cloud strategy, while 80% deploy a hybrid cloud strategy. The average…

Okta Joins the ID2020 Alliance

If you’re reading this on any kind of digital device, you probably use various forms of digital identity on a regular basis. From accessing healthcare to participating in democracy to protecting our finances, modern life requires identity.  For most of us, it’s impossible to imagine how we’d live our lives without verifiable identification. Yet,…

CCPA vs. GDPR: Similarities and Differences Explained

The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are laws that emerged to give individuals greater power over their personal information. Both regulate organisations that collect and use data in a variety of ways. A brief summary of the CCPA: Gives California residents increased transparency and control…

Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?

Being authentic is a high term of praise—if we think people are authentic, we believe them to be trustworthy, loyal, and dependable. There's a similar concept in computer security. Business networks are crucial to protect, so firms want only authorised people accessing them. In cybersecurity, authentication means verifying that a person or device…

Archive