Workforce Identity Cloud

Implementing security best practices in Okta developer orgs

How we’ve fortified security in Okta Developer Edition Service Securing customer-facing services or developer playgrounds is paramount in this age of software development. This post discusses various strategies and measures that we have adopted to fortify our Developer Edition Service. Join us as we walk you through our journey of establishing…

Launch Week '24: Oktane edition

Launch Week is here again, and this time around we have a special Oktane edition. As usual, you’ll learn about our newest innovations, but you’ll also get a sneak peek into exciting developments that will be available in the coming year. Let’s dive in. Okta Workforce Identity Cloud Identity has become the organizational security linchpin, and…

New enhancements to the Workforce Identity Cloud's unified security solution announced at Oktane 2024

Technology is unlocking opportunities and business outcomes like never before, but it’s also introducing complexity and potential risk for organizations.  When a biomedical engineering team spins up new AI models, they could drive business outcomes like accelerating a clinical trial for a new vaccine. At the same time, IT and security teams have…

Okta’s mission to standardize Identity Security

Identity is under attack. Over 80% of data breaches involve compromised Identity,* the main enterprise security entry point for workforce and consumer applications.  Lack of standardization is a major reason for this. Without a unifying industry standard for Identity Security that provides full visibility into every part of the technology stack,…

Tools for enforcing authentication policy

As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.  Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…

Evolving Okta’s edge infrastructure

Okta is constantly evolving our cloud infrastructure to meet the needs of our customers. We place reliability and scalability at the core of our design decisions for services that process billions of authentications per month. This article dives into how a recent project to remove one of our most heavily trafficked services yielded significant…

How Thoughtworks solves the big (and small) problems with Okta Workflows

Thoughtworks is a global software consultancy firm with a reputation for tackling tough projects. As Steve Quirke, Identity team lead, explains: “We’re here to build the products that differentiate our customers from the competition. Clients hire us for our ability to digitally transform global enterprises at scale by applying strategic consulting…

How strong governance can reduce your SaaS spend

Identity governance has traditionally been considered a compliance-first toolset. For businesses looking to adopt an IGA solution, this has meant audit trails, thorough reporting, and access controls. But more recently, IGA’s security-driven role has grown. Savvy CISOs and CIOs recognize how the right solution can help safeguard an organization…

Leveraging Identity to discover vulnerabilities and determine proper access

Robust Identity protection starts before attackers reach your digital front door.   Identity is the most common vector of attack for bad actors looking to improperly access sensitive information. Over 80% of breaches stem from some form of credential abuse, making the task of reliably authenticating Identity a core concern for security leaders in…

Archive