In this edition of The Dogfooding Chronicles, we’re going to discuss both sides of the same security coin: 1. How your end-users can serve as the first line of defence against credential-based attacks, and 2. how your IT department can automate tactical defence actions by using Okta’s new Workflows automation and UserInsight tools.
Frodo! I swore…
In today’s increasingly digital environment, employees and contractors can sign into workplace applications and systems from anywhere with a simple set of credentials. And while this might make things easier for employees and contractors alike, it also puts organizations at heightened risk of a specific form of cybercrime: phishing.
Designed to…
As new technologies continually integrate themselves deeper into the lives of average consumers, these users increasingly benefit from the enhanced productivity and convenience that these technologies offer. That being said, knowing how to leverage these technologies in a way that optimizes personal privacy isn’t always intuitive for the average…
Today, we announced the findings of our sixth annual Businesses @ Work report, exploring how organizations and people work today. Businesses @ Work paints one of the clearest pictures of how organizations evolve when it comes to technology, and the trend line clearly points to greater adoption across the board; over the past six years, we’ve seen…
There’s no instruction manual for digital transformation. Modern organizations know that to streamline operations, defend data, and secure customer applications, moving to a cloud-based IT infrastructure supported by strong identity and access management (IAM) is critical. But where does this journey begin? What does it entail? When does it end?…
In the first blog of this series, we explained why it’s time to break-up with Active Directory (AD). In the second, we listed the top five things you can look forward to after making the change. So now we’re breaking down the four stages of separation you’re going to experience as you reduce your dependency on, and potentially leave, Active…
As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it.
This trend applies to both…
In 2019, we made the exciting announcement that Okta Access Gateway (OAG) is available to all of our customers. In that post, we described how Access Gateway helps businesses implement modern access management solutions like single sign-on (SSO) and adaptive multi-factor authentication (MFA) across their on-premises applications.
The result is…
Have you ever stumbled on a great airline deal only to find out there's an additional cost for checked luggage? Or signed up for a credit card offer with amazing perks, only to get stung by a higher-than-normal annual fee? You're not alone. It’s these experiences that remind us that if something sounds too good to be true, it probably is. …
Cybercriminals have evolved from lone hackers targeting small websites and systems into dangerous entities launching large-scale cyberattacks that affect millions of people worldwide. In recent years, we’ve seen multiple huge ransomware attacks like WannaCry and NotPetya cause hudereds of millions or even billions of dollars in damages and lost…