security

Okta Passkey Management: A New Feature Flag

Apple recently announced support for Multi Device FIDO credentials - also called passkeys. Passkeys allow users a passwordless login to all of their iOS and macOS devices. Passkeys provide a better user experience across websites and apps, and enhance security by virtue of being a standards-based technology that–unlike passwords–is resistant to…

Security & User Experience: No More Compromises

No one enjoys making compromises. Yet, when it comes to developing new experiences for their customers, product teams are often forced to make trade-offs between security and user experience. This dilemma is fuelled by the evolving expectations of consumers. With brands like Amazon and AirBnB leading the way in digital experience, customers now…

How Okta Elite Partner, Upright Security, Supports Customers in Every Step of Their Identity Journey

Securing access to digital assets has never been more important. In our increasingly connected, cloud-powered world, propelled into a new age of remote access by COVID-19, businesses can’t afford not to make identity and access management (IAM) a priority. But even for experienced businesses, implementing the right IAM tools in the right way can…

What Is Two-Factor Authentication (2FA)? 

Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network. Think of your most recent login…

5 Key Takeaways from Our 2021 State of Zero Trust Security Report

How important is it to implement Zero Trust? We asked over 600 business and security leaders across North America, Asia Pacific (APAC), Europe, the Middle East, and Africa (EMEA)—and the overwhelming consensus is that it has become crucial. With the unprecedented shift to remote work, the adoption of new digital products and services, and the…

What is Password Hashing and Salting?

Security is often not top of mind when creating customer-facing applications. But in a landscape of continual data breaches of major corporations like T-Mobile and Google, companies must be vigilant to adhere to security best practices. Processes like password salting and hashing are fundamental to the security posture of your apps. Understanding…

Okta Privileged Access: Unlocking Zero Trust Security at the Infrastructure Level

Every company that operates production software has compliance requirements. The vast majority of those organisations also carry significant infrastructure in the cloud and/or on-premises. And they all require a safe way to provide access to their developer workforce. Traditionally, there were two ways to achieve this: building a DIY system to…

Archive