Okta’s Core Values: Be Transparent with Audrey Hoffman-Lekmine

Transparency provides room for honesty, improvement, and growth. Our fourth core value is “Be transparent,” so we share information widely across all levels of the company. Audrey Hoffman-Lekmine, our internal communications lead, embodies this core value by managing Okta’s internal communications strategy and coaching others on how to communicate…

Want to Secure Your APIs? You’ll Need OAuth 2.0 for That

We’re experiencing the rise of the API economy. Whether it’s for a backend system, partner-facing website, or a mobile application designed for customers, companies rely on APIs to share data with more end users than ever before. Unfortunately, APIs are proving to be a major point of vulnerability. This stems primarily from the fact that APIs are…

What Are the Elements of Identity Proofing?

This series aims to help companies understand the basics of identity proofing and implement it effectively. In our first post, we explored how identity proofing has been defined by the National Institute of Standards and Technology (NIST). We also contextualized it within how companies validate the identities of their customers and prevent modern…

Okta’s Core Values: Act with Integrity with Micah Silverman

Integrity defines all that we do. Our third core value is to “Act with integrity” and treat our customers, partners, and communities with respect. Micah Silverman, senior developer advocate, has embodied this core value while on three different teams at Okta. Currently, Micah serves as a trustworthy developer evangelism speaker that is always…

SecurityInsights: Protection at the Admin, User, and Network levels

Modern organizations are adopting new technologies more rapidly than ever before, and their increasingly mobile workforces — which include not only employees, but external contractors and partners — have expanded far beyond office walls. Today’s organizations face progressively complex security challenges, and must maintain a posture that offers…

9 Admin Best Practices to Keep your Org Secure

When implementing security policies across an organization, most administrators want to adhere to industry best practices. But that’s not as easy as it may seem: the threat landscape isn’t static — it’s changing day by day. What were once considered the best practices for security configurations, including password policies and MFA requirements,…

Archive

Follow Us
Share on Linkedin Share on Youtube