
How To Improve Okta Security
Okta is one of the most widely-used single sign-on (SSO) providers, making authentication more convenient for organizations and their users alike. We at HYPR use Okta. This convenience, however, comes at a price. Okta deployments are both highly targeted by and, as repeatedly demonstrated, highly vulnerable to attacks ... Read More

Aligning With NSA’s Cloud Security Guidance: Four Takeaways
The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more secure. The report contains a Cybersecurity Information Sheet (CSI) for each strategy, which includes MITRE ATT&CK and D3FEND ... Read More

How to Use Context-Based Authentication to Improve Security
One of the biggest security weak points for organizations involves their authentication processes. According to Google Cloud’s 2023 Threat Horizons Report, 86% of breaches involve stolen credentials. Our own research found that 60% of organizations reported authentication-related breaches in the past year. Context-based authentication offers an important tool in the ... Read More

Identity Proofing: Best Practices in the Workplace
With employee identity risk and fraud on the rise — to the point that the FBI has issued a public warning — it’s crucial to ensure that employees are who they say they are. Is the person you interviewed the same person you actually hired? Is the person logging in ... Read More

PCI DSS 4.0 Authentication Requirements: 5 Things to Know
The Payment Card Industry Security Standards Council recently updated their Data Security Standard (PCI DSS) for protecting payment card data. The latest version, PCI DSS 4.0, introduces more than 60 new or updated requirements, with new directives around passwords and multi-factor authentication (MFA) among the most consequential ... Read More

The State of Passwordless Security 2023: Report Recap
Cyberattacks continue to increase at an alarming rate, and many security breaches can be traced back to an authentication issue. Whether a password or a password plus an additional authentication factor, attackers are adept at bypassing them at scale. For example, over 100 million multi-factor authentication (MFA) attacks were recorded ... Read More