In
Security
How to get people to adopt 2FA
Two-factor authentication (2FA). You’ve heard about it, nagged about it (or have been nagged about it), but let's face it—getting...
Latest articles
In
Security
How to get people to adopt 2FA
Two-factor authentication (2FA). You’ve heard about it, nagged about it (or have been nagged about it), but let's face it—getting everyone on board...
Empowering security innovation by joining Microsoft's Copilot for Security
We're excited to announce that we are a Microsoft Copilot for Security partner. This program is an invaluable initiative by Microsoft, designed to...
Integrate native social media apps with Okta using Cerby
Social media networks like Facebook, Instagram, X, TikTok, Snapchat, Pinterest, and LinkedIn are built for individuals. How can the social media...
In
Security ,
SaaS Admin
What does “good” app management look like?
Hello, business app admin. Don’t worry, we know that’s not your actual name. But if you’re an admin for any tech at your company and don’t sit...
In
Security
Nonstandard applications in an identity-first world
Nearly every web application (app) today requires us to verify who we are by signing in with a username and password or “Login with Google” (or some...
In
Security ,
Zero Trust
Zero Trust part three: policy and monitoring
In this Part 3 of a series examining Zero Trust in more detail, John provides an in-depth view of the fourth and fifth steps in implementing Zero...
In
Security ,
Zero Trust
Zero Trust part two: Lockdown your unmanageable apps
In this Part 2 of a series examining Zero Trust in more detail, the creator of Zero Trust, John Kindervag, provides an in-depth view of the second...
In
Security
How to manage multiple social media accounts
Digital marketing in the post-pandemic era has become more complex and extensive. One of the most significant factors to consider is access...