Identity Threat Protection with Okta AI 

Real-time, inline protection that keeps pace with your business Today's complex Identity threat landscape demands streamlined security practices and an evolving, multi-layered defense-in-depth strategy to identify and mitigate cybersecurity threats. Okta’s comprehensive security strategy addresses these threats at multiple levels, including at the…

Identity is the target

The “Big Store” con In 1822, a British ship landed on the coast of Honduras carrying 70 settlers eager to start a new life. The passengers of the Honduras Packet had paid handsomely to sail to the bustling town of St Joseph, a settlement of 20,000 people boasting a theater, an opera house, and a domed cathedral. St Joseph was the capital of the…

Working hard, living fully: My experience at Okta

Taylini Hodak, Manager of Technical Accounting and Reporting at Okta, shares her experience about how Okta enables professionals to take on meaningful challenges while maintaining a true work-life balance. Read her insights on growing professionally without sacrificing personal time at Okta. What makes Okta special?  I recently had the opportunity…

Okta Badges vs. Okta Certification: Understanding the difference and why you should get one

Okta Training recently released Skill Badges and Super Badges, and I wondered, ”What are these cool new badges, and how are they different from Okta Certifications?”  I’ve personally earned several Okta Certifications, and while badges and certifications demonstrate expertise in Okta's platform, they serve different purposes and carry different…

Securing privileged Active Directory accounts with Okta

In today’s hybrid IT landscape, Active Directory (AD) remains a cornerstone for Identity management. However, privileged AD accounts present a significant security risk if not managed properly.  That’s why we’re pleased to announce that AD integration with Okta Privileged Access is now available in Early Access. With this feature, organizations…

New secure Identity integrations streamline advanced protection for your most critical applications

As cyberthreats become more advanced by the day, securing your organization’s most critical applications requires more than single sign-on (SSO). Today, you need deeper security integrations to protect your apps — from managing user privileges to uncovering hidden risks and rapidly containing threats with built-in remediation and Universal Logout…

Launch Week ‘25: Showcase edition

Innovation never stops, and neither do we. As cyberthreats evolve, Identity remains the first line of defense. That’s why, during this Launch Week, we’re unveiling the latest advancements in Identity Security — designed to streamline access management and deliver seamless, secure experiences.  Whether you’re securing your workforce, customers, or…

Stay secure with FastPass and Trusted App Filters

Phishing resistance first Phishing-resistant authentication is the current baseline for secure authentication, which means FIDO/WebAuthn, FastPass, PIV/CAC, etc. This post will focus on how those already meeting this baseline can take security to the next level. Passwords, SMS, push notifications, and one-time codes are vulnerable to much less…

Archive

Follow Us
Share on Linkedin Share on Youtube