identity
Survey Sees Zero-Trust Transition Gaining Momentum
A recent Okta survey found the majority of organizations have implemented a zero-trust IT initiative, with another 35% planning to do so soon ...
Security Boulevard
Digital Identification: The Cornerstone for Confidence Online
By combining different digital identity technologies, organizations can withstand the deceptive tactics of cybercriminals ...
Security Boulevard
Survey Sees Shift to Passwordless Authentication Accelerating
A survey of 1,005 IT decision-makers published today found 89% expected their organizations to use passwords for less than 25% of logins within five years ...
Security Boulevard
Biometric Authentication for Digital Identity Protection
Nahla Davies | | Authentication, authorization, behavioral fingerprints, biometric, biometric identification, fingerprint, identity
Identity-based authentication that uses biometrics is a more reliable solution to identity and access management ...
Security Boulevard
Securing Active Directory and Azure AD
As enterprises have shifted to the cloud, Azure AD has been the natural way to extend the Active Directory paradigm ...
Security Boulevard
Insider Identity Risk to Cloud Security
Identity plays a major role in cloud security and can open the door for serious cybersecurity problems from the inside ...
Security Boulevard
The Battle of the Bots: Safeguarding Identity in the Age of AI
In the age of generative AI, identity is being exploited by attackers as a weakness in the security perimeter. Here's what to do ...
Security Boulevard
SaaS Super Admins Targeted in Social Engineering Campaign
John Filitz, Group Product Marketing Manager @ AppOmni | | Blog, identity, Okta, SaaS Security, SaaS Security Posture Management
Discover how threat actors hijack highly privileged roles in Okta tenants, and learn mitigation steps against social engineering campaigns. The post SaaS Super Admins Targeted in Social Engineering Campaign appeared first on ...
What This Year’s Data Breaches Reveal About Identity
These key takeaways for end users, application developers and security practitioners can help stop identity-based breaches ...
Security Boulevard
Survey Surfaces Identity Management Challenges in Cloud Era
The top three cloud security concerns are a lack of visibility into access policies, identity-based threats and meeting data privacy regulations ...
Security Boulevard