Okta Authentication Policy

The Complete Guide To Okta Authentication Policies

Here it is – everything you need to know about using Okta’s Authentication Policies to enhance your identity security posture. Okta is a leading independent cloud identity provider. It helps you manage user identities, synchronize legacy or on-premises identities to

Okta Verify MFA Bypass

Bypassing Okta’s Passwordless MFA: Technical Analysis and Detection

Bypassing Okta’s Passwordless MFA: Technical Analysis and Detection Authentication security has always been a key area in the battle between defenders and attackers. Security vendors continuously implement new controls to safeguard authentication processes, but attackers soon discover methods to circumvent

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Here it is - everything you need to know about using Entra ID's Conditional Access policies to boost your identity security posture.

10 Takeaways from the 2024 Gartner IAM Summit UK

Insights from Roy Akerman, CEO of Rezonate I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security.  After having some time to

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s IAM Summit will unfold in the vibrant city

How ITDR Could Have Helped Microsoft in the Midnight Blizzard Hack

Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures.  As winter crept in last year, so did identity threat actors. Microsoft revealed in January that the Russia-backed group

Rezonate unveils holistic identity-centric security for both human and non-human identities.  Learn more