Latest from Okta

The Proactive CISO’s Playbook: How to close the Exposure Gap and Manage Cyber Risk with Confidence

Trend Micro’s “The Proactive CISO’s Playbook” guides CISOs in shifting from reactive security to strategic leadership. It emphasizes incident readiness, cross-functional collaboration, and continuous improvement. By adopting a proactive, assume-breach mindset, CISOs can build resilient organizations, foster transparency, and drive board-level engagement in cybersecurity.

Read →

The 2024 Attack Intelligence Report

This report presents data and insights that security practitioners can use to better understand and guard against some of the most significant attacks and TTPs occurring in today’s cyber threat landscape. By examining recent notable vulnerabilities and high-impact attacks, the experts of Rapid7 Labs identify trends and add valuable context so you can command your […]

Read →

The Winning Formula for Loyalty Programs: Balancing Customer Experience, Security, and Privacy

Winning loyalty programs ensure that only legitimate customers are able to access their loyalty accounts and that those accounts are easily accessible and reflect their preferences and behaviors. This is not easy when customer Identity is fragmented across technology. Identity fragmentation impacts an organization’s ability to effectively track, analyze and secure customer data. Watch this […]

Read →

Multi-factor authentication deployment guide

As we’ve seen threats to password security increase in recent years, multi-factor authentication (MFA) has gained rapid adoption. For consumer and enterprise web and mobile applications, it’s become a key method of increasing authentication assurance. In this guide, we cover a lot of ground around authentication. First, we review the results of a survey, completed […]

Read →

Beyond Login: Maximizing CIAM’s Security Capabilities

Discover how Customer Identity and Access Management (CIAM) can enhance your security. Learn to battle bots, fake signups, and stolen credentials while streamlining authentication and authorization. Key Takeaways:• The importance of CIAM for securing customer data.• Identifying and mitigating identity threats.• Using phishing-resistant methods like passkeys.• Benefits of an adaptable CIAM solution. Speakers:Linda Gong, Product […]

Read →

Building a Flexible, Agile Enterprise with Identity

In just the last three years, Global 2000 executives have had to navigate their businesses through a pandemic, a geopolitical conflict, and a period of economic uncertainty. That means constantly optimizing for an efficient, cost-effective, and flexible organizational structure–especially when undergoing transformations like mergers and acquisitions, global expansion, and divestitures or restructuring. For large organizations, […]

Read →

How Workforce Identity Can Power Security

Identity has always been a component of an effective cybersecurity program. Now it’s taking on a more central role, as attacks increasingly use phishing and other methods to steal credentials and log into accounts. As a pillar of the Zero Trust approach to security, Identity is also crucial to granting user and service access on […]

Read →

Okta & AI: How Artificial Intelligence is Reshaping Identity and Access Management

Artificial intelligence is reshaping how organizations operate and is powering innovative products and services by commoditizing optimization, data analysis, anomaly detection, and other prediction-based applications. In this white paper, we aim to pull back the curtain on Okta’s relationship with AI by exploring why Identity is especially well-positioned to benefit from AI and how Okta […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights