One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues.
Bala Kumar of iovation, a TransUnion company, sees a marked spike in identity fraud in general, and at account origination in particular. How does this increase manifest across industry sectors, and how should organizations re-think their defenses?
Employees view the ability to bring their own devices into their workplace life as a prerequisite for any job, which complicates organizations' identity management and cybersecurity efforts, says Barry McMahon of LastPass.
The shift to the cloud has made the perimeter-centric view of security obsolete and led to the creation of the "zero trust" approach. But how do we best manage identity as the new security perimeter? Teju Shyamsundar of Okta shares insights.
Armed with billions of stolen records, fraudsters create synthetic identities to apply for credit cards, loans, and other types of credit causing unprecedented losses to financial institutions.
Download this brief to find out how to block application fraud from the start.
Identity attacks such as phishing, credential stuffing, and brute-force-attacks are increasingly common and sophisticated methods for committing account takeovers. These attacks result in increased security risks, brand damage, and outright fraud.
Download this whitepaper to learn how to keep attackers at bay...
Gartner recently recognized Okta as a Leader in the "Magic Quadrant for Access Management" for the third year in a row. Additionally, Okta has been placed highest both "Ability to Execute" and "Completeness of Vision" making us the first vendor in the report's history to do so.
Okta believes this recognition from...
The FBI is warning banks, businesses and other organizations that cybercriminals are using social engineering and other technical techniques to circumvent multifactor authentication security protections.
We now live in a world of multiple identities, multiple protocols, multiple technical solutions and billions of internet users. In this session, we discuss the challenges and opportunities that European Ecosystems can bring to the user, organizations and third parties. Among the topics:
Linking identity provider,...
123456, password, password1: These are a few of the top passwords used by Fortune 1000 employees whose passwords and personally identifiable information have been exposed in third-party breaches. While the dangers of easy-to-guess passwords are well-known, even employees at top companies are guilty of bad password...
Expectations of online businesses have never been higher. Customers expect personalised experiences and high platform security, while demanding more streamlined registration processes. And if they don't get them, they'll take their business elsewhere.
Resultantly, businesses are experiencing a profound tension. How...
The unrelenting tide of data breach and compliance challenges continues to plague an increasingly mobile workforce and business models. This has caused a dynamic transformation in the way employees, partners, contractors, and visitors are authenticated.
Download this white paper to learn more about: