3 Lessons Learned from Attacks on Okta Super Admins

3 Lessons Learned from Attacks on Okta Super Admins

Discover the latest Okta security incident, learn about identity federation abuse, and find out how to protect your Okta environment. Explore the risks and solutions. The post 3 Lessons Learned from Attacks ...

Top 10 Identity Security Risks and Threats for 2023

The 2023 IDSA report reveals 84% of organizations, including giants like SolarWinds and Uber, faced identity-related breaches, underscoring the urgent need for enhanced identity security practices. Discover more and safeguard your organization ...
5 Steps to Protect Against MFA Bombing

Authomize Open Sources MFA Bombing Training Tool

Explore Authomize's new open source training tool designed to raise awareness and enhance resilience against MFA Bombing attacks. The post Authomize Open Sources MFA Bombing Training Tool appeared first on Authomize ...
Creating and Using a Custom SWA Application | Okta Support

Misconfiguration Expose Okta Master Passwords

Authomize’s Security Research Lab has released a new report outlining misconfiguration risks for Okta users that can lead to the theft of cleartext Okta master passwords and compromise of all cleartext passwords ...

Extending Identity Security Visibility for Azure AD Identity Protection

Your ability to properly assess your risk is directly correlated to the breadth and depth of your intelligence.  For security teams seeking to protect against identity-based threats, they need to be able ...

OpenITDR is Open for Business: New Open Framework for the ITDR Community

Authomize, the Identity Threat Detection and Response Platform, announced today the launch of the OpenITDR Framework Initiative. The post OpenITDR is Open for Business: New Open Framework for the ITDR Community appeared ...
Admin Impersonation Demo Video (IdP/SSO)

5 Signs of an Identity Attack

Identity attacks are increasing and putting organizations' data at risk. Look out for these 5 warning signs of an identity attack: stale accounts, user impersonation, lateral movement... The post 5 Signs of ...
Trust but Verify — How to Secure Identity Provider Trust Relationships

Trust but Verify — How to Secure Identity Provider Trust Relationships

Despite their best intentions, organizations find themselves contending with all too common admin sprawl throughout their apps and environments, leaving them with far more admins than they can handle securely... The post ...
Spike in number of failed logins month view

Authomize Research on Post-Holiday Account Takeovers

Discover the motives and behavior of cyber criminals and how to protect yourself with Authomize's Identity Threat Detection and Response (ITDR) platform. The post Authomize Research on Post-Holiday Account Takeovers appeared first ...

Okta’s Source Code Stolen in GitHub Breach

| | Breach, IdP Security, ITDR, Okta
Okta’s source code was stolen in a breach of their GitHub repos, marking the 2nd significant attack on this critical IAM provider. Read how to secure your Okta with ITDR. The post ...