cybersecurity

Welcome to the Age of Identity

On Thursday, June 3, Okta is hosting our next big virtual conference, Age of Identity: A Public Sector Forum. The event will feature top leaders and decision-makers from the public sector IT community as well as Okta’s CEO Todd McKinnon and World Wide President of GTM Operations, Susan St. Ledger. Public sector organizations are responsible for…

2021 POV (Not Predictions) for Federal CISOs

First of all, this is not a list of 2021 predictions for security leaders serving in government agencies. I don’t think there’s much to predict in the way of envisioning how attackers are looking to compromise federal security systems and data. That is to say, we don’t have to envision anything, we can simply observe what happened in 2020 to know…

Trailblazing Okta Distributor Distology is Helping Partners Thrive in a Fast-Changing World. Here’s How

As spending in the global cybersecurity market continues to increase, so does the number of organizations, tools, professionals, products, developers, and partners offering security solutions. Even for professionals, choosing the right one can be a daunting task. That’s why IT distributor Distology takes matters into its own hands, continually…

Establishing Zero Trust Security, One Step at a Time

Yesterday, implementing Zero Trust security was important—today, it’s an imperative. Tomorrow, organizations that still haven’t rethought their security strategies  could be left in the dust. But there’s still a chance to get ahead without investing in all the infrastructure you need at once; once you start the journey, it’s easy to continuously…

Advisory 2020-008: Mitigating the Risks of Copy-Paste Compromises

Australian Prime Minister Scott Morrison recently raised awareness of a state-based cyber attack that Australia is facing across all levels of government and the private sector. In response, the Australian Cyber Security Centre (ACSC) published an advisory on the nature of the attacks as well as guidance on how to mitigate these types of attacks…

Why You Should Ditch SMS as an Auth Factor

In my previous post, I talked about how the COVID19 pandemic has impacted how our customers use MFA — more specifically how SMS authentication is on the rise as organizations look to rapidly roll out a quick and easy secondary auth method in response to the need to embrace remote work. In this post, I’ll go into more detail around issues with SMS…

MFA Trends: The Impact of COVID19

The COVID pandemic has changed how we do many things. In the workplace, it’s pushed us to take a deeper look at how we enable employees to work remotely—and to ensure that they can do it securely. But what does that actually look like? According to our recent Businesses @ Work (from Home) report, companies are adapting and evolving quickly…

API Security Threats in the Real World

When we think of compromised API security, we typically see an image of a hoodie-wearing hacker toiling away in a darkened room, targeting a bank’s server. We can imagine them compiling a custom tool, launching it against the system, and celebrating as your 401k becomes theirs. Alternatively, we may even picture armies of hackers using…

Archive