The SOAR Buyer’s Guide

Investing in a Security Orchestration, Automation and Response (SOAR) platform is a wise and highly strategic…

2020 Gartner Market Guide for Security Orchestration, Automation and Response (SOAR) Solutions

The security technology market, in general, is in a state of overload, with pressure on budgets,…

Building a Client-Centric Law Firm: Client Engagement for the Modern Practice

Securing the “New Normal”: Tips and Best Practices from Okta’s Security Leads

While distributed workforces are a new model for many security organizations, Okta’s security teams have been…

Cover Your Bases: Best Practices for Protecting Remote Work

As the Okta security team, we know employees are the first line of defense when it…

Security Built to Work Outside the Perimeter: 3 Reasons to Choose Adaptive Multi-Factor Authentication

In this whitepaper, we breakdown the acronyms, pros, and cons of 2-Factor Authentication (2FA), Multi-Factor Authentication…

Ransomware threats: Protecting financial institutions’ data

The financial services sector: The second largest source of data breachesThe stakes are incredibly high when…

Navigating Unfamiliar Legal Matters with Confidence

How small business attorneys can deliver sound guidance as they successfully manage a never-ending, always changing…

A Foundation for ‘Zero Trust’ Security

The traditional perimeter-based security model is obsolete. Instead of believing everything inside the corporate firewall is…

No passwords, no problem

No passwords, no problem: Using WebAuthn to stop account takeover DetailsWant to eliminate passwords? We all…