Security practitioners worldwide face the same challenge: provide robust security and enhanced user experience. In a landscape of continued change and evolution, knowing all of our options becomes difficult. The seemingly elusive solution is to provide our end users with a seamless experience while requiring them to perform powerful, phishing…
Image generated using DALL·E 2
This blog explores the robust security benefits of phishing-resistant authenticators, which can significantly bolster an organization’s cybersecurity measures beyond the scope of phishing attacks. The percentage of phishing-resistant authentications serves as a tangible indicator of an organization’s proactive use…
Artificial intelligence (AI), and specifically generative AI (GenAI), is helping jumpstart revolutions in various industries. Unfortunately, some of this technology’s earliest and most aggressive adopters have been cyberattackers. The exponential growth in GenAI capabilities has proven irresistible, allowing even novice criminals to conduct…
Cyber attackers are constantly evolving and developing more sophisticated methods. Phishing and social engineering attacks are increasing, and as quickly as organizations implement more advanced authenticators, attackers adapt to them. One emerging strategy involves stealing session tokens directly from users' web browsers, presenting a fresh…
Financial services providers are having serious, board-room-level conversations about what’s next for workforce security. Every type of financial services provider faces the challenge of improving workforce productivity and satisfaction while maintaining the highest level of digital security. It’s a difficult balancing act to pull off, especially…
When it comes to AI’s impact on the global economy, the projections are staggering.
Generative AI could inject up to the equivalent of $4.4 trillion annually into the world economy, according to McKinsey. PwC puts AI’s potential contributions to the globe’s coffers at $15.7 trillion by 2030 — more than China’s and India’s current output combined…
Secure browsers. Frontline worker digital security. Identity security posture management. Verifiable credentials. Software secure by design.
At Okta Ventures, our interactions with visionary founders and teams give us a front-row seat to these new innovations.
We asked eight founders for their perspectives on what is coming in 2024, and we got…
Contributing to approximately 60% of all social engineering attacks and 36% of all data breaches, phishing claims the number one spot among cybercrimes. With 80–90% of all compromises originating from an unmanaged device, unmanaged iOS devices deserve a place at the top of your security concerns.
Okta FastPass
Okta FastPass protects users…
Security. It’s a hard business. I’m not just talking about the endless patching, monitoring, and training. The constant sprint to remediate when a new CVE (Common Vulnerability and Exposures) notification drops, or the lingering fears that you’ll be called back to the office on your downtime to deal with a crisis.
No, it’s hard because it’s not a…
TL;DR: How to right-size your MFA solution to do more with less.
Key takeaways include:
Understanding small business authentication and MFA factors
Considerations including ease of use, cost-efficiency, pros and cons
Creating your MFA implementation plan
If you’re reading this you know that when attackers get control of the right identity,…