security

Top 10 Reasons Valentines are Like Passwords

Happy Valentine's Day from the Okta team! We've had some fun thinking about chocolate, flowers and all things Enterprise Identity Management and came up with the Top 10 11 reasons valentines are like passwords. Enjoy! You get in trouble if you use the wrong name Sharing isn't advisable Neither should be your dog If you break up, you lose access…

Securing Layer 7: The Closest Point to the End User

Building and maintaining Okta’s security program is an interesting job, to say the least. The stakes are high: Not only is identity management core to IT, it is central to an enterprise’s security. Plus, Okta delivers IDM from the cloud, so between mobile devices, third-party partners and the inherent security concerns associated with user habits,…

Keeping it Simple to Keep it Secure

The New York Times recently ran an interesting profile of Peter Neumann, one of the preeminent computer scientists in the world. The story, “Killing the Computer to Save it,” details Neumann’s ideas for how to solve the inherent security vulnerabilities in computer systems that have been repeated again and again for the past 50+ years. Neumann’s…

Encryption in the Spotlight due to Vulnerable Android Apps

Last week, Ars Technica’s Dan Goodin published a story detailing how downloaded Android applications have the potential to expose the sensitive personal data of more than 185 million users. Vulnerabilities due to inadequate or incorrect use of SSL/TLS protocol libraries expose everything from online banking and social networking credentials to e…

Okta Named an Enterprise Cloud IAM Leader

To see our most recent placement as a leader in the Forrester Wave for Identity-As-A-Service, click here. Today we announced some exciting market momentum – in a July report, Forrester Research, Inc. named Okta a cloud identity and access management (IAM) leader. The report – “The Forrester Wave: Enterprise Cloud Identity and Access Management, Q3…

Archive