The weakest link: Securing your extended workforce

Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security postures and programs that support its over 19,000 customers.  Charlotte has an extensive background in the delivery of security transformation…

Migrating off legacy Tokio at scale

The engine that drives millions of Okta Workflows executions each day was an early adopter of the async Rust ecosystem. While Tokio is the natural choice for an async runtime today, we launched Workflows before the release of Tokio 1.0, and well before the best practices and patterns for async Rust had really solidified.  This article details how…

Okta Workflows authorized at FedRAMP High: A new era of secure automation for the U.S. Public Sector

Okta Workflows is authorized for Okta for Government High As Okta’s U.S. Public Sector leader, my top priority is supporting our public service providers as they modernize IT to improve efficiency and service delivery. This includes adopting modern tools and creating innovative workflow frameworks that streamline burdensome and time-consuming…

Introducing Log Investigator: Transform your security operations with AI-powered log analysis

Detecting and responding to potential Identity security threats is no longer simply an advantage in modern cybersecurity but a necessity. At the same time, as organizations scale their digital operations, Identity security practitioners need access to a richer and more complex set of identity log data than before — one demanding constant attention…

Implementing security best practices in Okta developer orgs

How we’ve fortified security in Okta Developer Edition Service Securing customer-facing services or developer playgrounds is paramount in this age of software development. This post discusses various strategies and measures that we have adopted to fortify our Developer Edition Service. Join us as we walk you through our journey of establishing…

Spotlight on Dr. Peter Schuermann: A story of perseverance, continuous learning, and community

According to ISC2, the global cybersecurity workforce gap stands at a staggering 4.8 million jobs, with 90% of organizations identifying critical skill shortages in areas like AI, cloud computing security, Zero Trust implementation, digital forensics and incident response, application security, and penetration testing. Programs like What’s Next by…

3 ways Okta can help you improve your security posture and respect privacy-forward human rights

This is the second in our blog series on trust/security and human rights. You can find our first blog here. Identity is the connection between people and technology, and it’s the front door to all digital interactions. As the threats we face evolve, Identity has become increasingly important to our communities and workplaces. Cybercriminals are…

Help reshape Identity security: Join the IPSIE working group 

At Oktane this year, we announced that the OpenID Foundation (OIDF) has launched a working group devoted to creating the first unified enterprise Identity security standard. Called Interoperability Profiling for Secure Identity in the Enterprise (IPSIE), the group aims to tackle key challenges that underlie Identity security in today's enterprise…

How centralized Identity solutions streamline security and resident engagement

State and local government agencies continually seek more cost-effective solutions to protect their sensitive data and improve the user experience of the residents they serve. One essential component in that equation is the increasing need for centrally managed Customer Identity and Access Management (CIAM) tools, says Okta’s first Public Sector…

Decentralized Identity: The future of digital Identity management

Decentralized Identity is a methodology that allows individuals to securely control their digital Identity without relying on a central authority. The need for decentralized Identity Traditional Identity models do not protect user interests and can leave personal information vulnerable. Decentralized Identity helps close the gap on a growing list…

Archive

Follow Us
Share on Linkedin Share on Youtube