Securing the “New Normal”: Tips and Best Practices from Okta’s Security Leads

While distributed workforces are a new model for many security organizations, Okta’s security teams have been…

Cover Your Bases: Best Practices for Protecting Remote Work

As the Okta security team, we know employees are the first line of defense when it…

Security Built to Work Outside the Perimeter: 3 Reasons to Choose Adaptive Multi-Factor Authentication

In this whitepaper, we breakdown the acronyms, pros, and cons of 2-Factor Authentication (2FA), Multi-Factor Authentication…

Ransomware threats: Protecting financial institutions’ data

The financial services sector: The second largest source of data breachesThe stakes are incredibly high when…

Navigating Unfamiliar Legal Matters with Confidence

How small business attorneys can deliver sound guidance as they successfully manage a never-ending, always changing…

A Foundation for ‘Zero Trust’ Security

The traditional perimeter-based security model is obsolete. Instead of believing everything inside the corporate firewall is…

No passwords, no problem

No passwords, no problem: Using WebAuthn to stop account takeover DetailsWant to eliminate passwords? We all…

The Forrester Wav – Security Analytics Platforms, Q4 2020

Enterprises are moving their workloads to cloud-based solutions to scale, keep up with remote workforces, improve…

Top 50 Security Threats – Splunk

Like you, cybercriminals are on their own digital transformation journey. Trends like remote work, Internet of…

The Future-Ready SOC

The Future-Ready SOC: Using XDR to Achieve Unified Visibility and Control CIOs and CISOs of globally…