Company + Product

Company + Product

5 tips to help secure OAuth and OpenID Connect tokens

Safeguarding personal and business information is more crucial than ever as digital technology becomes increasingly prevalent. Identity serves as the primary security boundary for enterprise and consumer applications. As cyberattacks and data breaches continue to rise, protecting sensitive data has become a key priority for individuals and…

Non-human and human identities: A unified approach

Organizations often treat human and non-human identities (NHIs) as separate security challenges. This siloed approach made sense in traditional data centers. However, the rapid adoption of cloud services and SaaS applications has fundamentally changed how identities interact and how to secure them. Managing human and machine identities separately…

Now available: Okta Learning

Ready to set yourself apart in the cybersecurity industry? Get started with Okta Learning and grow your Identity expertise.     Okta Learning is our modernized learning experience, featuring over 200 public courses with bite-sized content, curated learning plans, a skill-badging recognition program, and more. Learners gain access to comprehensive,…

Launch Week ‘25: New Year Edition

We are thrilled to kick off our first Launch Week of the year, showcasing the latest innovations in identity for all organizations. Let’s get started. The Okta Platform Identity is the number one attack vector1, and as the world’s leading Identity company, we are dedicated to delivering Identity security that is comprehensive, seamlessly…

How Okta mitigates OWASP’s Top 10 Non-Human Identity Risks

Non-human identities (NHI), including machine identities, service accounts, API keys, and automation tools, play a critical role in modern cloud environments and enterprise applications. Yet, the proliferation of secrets—like hardcoded credentials, tokens, and certificates—introduces security risks that can be exploited if not properly managed. As…

Controlling access to shared social media accounts with Okta

It is common for organizations to use accounts that are shared between multiple people to manage their social media presence. But the challenge for IT and Security teams is how to ensure proper use of these accounts. A social media account hijacking or credential compromise can cause significant damage to a brand’s image and reputation. Only…

Archive