While distributed workforces are a new model for many security organizations, Okta’s security teams have been…
Category: IT Security
Cover Your Bases: Best Practices for Protecting Remote Work
As the Okta security team, we know employees are the first line of defense when it…
Security Built to Work Outside the Perimeter: 3 Reasons to Choose Adaptive Multi-Factor Authentication
In this whitepaper, we breakdown the acronyms, pros, and cons of 2-Factor Authentication (2FA), Multi-Factor Authentication…
Ransomware threats: Protecting financial institutions’ data
The financial services sector: The second largest source of data breachesThe stakes are incredibly high when…
Navigating Unfamiliar Legal Matters with Confidence
How small business attorneys can deliver sound guidance as they successfully manage a never-ending, always changing…
A Foundation for ‘Zero Trust’ Security
The traditional perimeter-based security model is obsolete. Instead of believing everything inside the corporate firewall is…
No passwords, no problem
No passwords, no problem: Using WebAuthn to stop account takeover DetailsWant to eliminate passwords? We all…
The Forrester Wav – Security Analytics Platforms, Q4 2020
Enterprises are moving their workloads to cloud-based solutions to scale, keep up with remote workforces, improve…
Top 50 Security Threats – Splunk
Like you, cybercriminals are on their own digital transformation journey. Trends like remote work, Internet of…
The Future-Ready SOC
The Future-Ready SOC: Using XDR to Achieve Unified Visibility and Control CIOs and CISOs of globally…