Okta

Solving the Identity Crisis: Okta Redefines Security in a Machine-Led World
Okta is stepping forward with its boldest platform evolution yet, aiming to unify identity across human and machine actors, and extend zero-trust all the way from cloud to on-premises ...
Security Boulevard

Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password
Tom Eston | | APT, Cyber Security, cyber threat, Cybersecurity, Data breach, Data Privacy, Digital Privacy, election, Episodes, Hacking, Information Security, Infosec, Okta, Podcast, Podcasts, Privacy, security, technology, Teen, Teenager, Teenagers, vulnerability, Weekly Edition
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring ...

Demystifying Okta Attacks with Dorothy and Splunk
https://github.com/elastic/dorothyOverviewOkta is a leading identity and access management (IAM) platform designed to help organizations securely manage and streamline user authentication and authorization. It provides a comprehensive suite of services, including single sign-on ...

How to Correctly Use Client IP Addresses in Okta Audit Logs to Improve Identity Security
Farah Iyer | | Client IP Addresses, Developer Field Notes, FEATURED, identity security, Okta, Okta Audit Logs, Product Spotlights, Security Guidance
Being able to identify client IP addresses is essential for detecting and preventing identity-related threats. These IP addresses help establish a baseline of identity activities and highlight deviations often associated with threat ...

Top 10 Features to Enhance Your Okta Security Posture
Rezonate | | identity management, Identity provider, ITDR, Okta, Okta Breach, Okta Security, research, security, Technical
We break down 10 key security configurations and features to ensure robust authentication and identity management within your Okta instance to help prevent future attacks. The post Top 10 Features to Enhance ...

Cybersecurity Insights with Contrast CISO David Lindner | 2/2/24
Insight #1 Ransomware payments dropped to 29% in the last quarter of 2023. Will ransomware be a thing if victims stop paying completely? It seems we are getting closer to that reality ...
Microsoft Storm-1152 Crackdown: Stopping Threat Actors
Wajahat Raja | | Arkose Labs, CaaS, CAPTCHA, collaboration, cyber threat response, cybercrime, Cybersecurity, cybersecurity community, Cybersecurity News, Duong Dinh Tu, extortion, hacking group, industry experts, Information Sharing, Kevin Gosschalk, law enforcement collaboration, legal actions, Linh Van Nguyễn, MGM Resorts, Microsoft, Okta, Ontinue, outlook, Ransomware, scattered spider, Storm-1152, Tai Van Nguyen, Vigilance
In a significant stride against cybercrime, Microsoft has declared victory in dismantling cybercrime operations of Storm-1152. This group, a major player in the cybercrime-as-a-service (CaaS) ecosystem, was involved in selling access to ...

How Threat Actors Leveraged HAR Files to Attack Okta’s Customers
On October 19, 2023, Okta notified its customers of a security breach involving unauthorized access to their support system. This incident occurred when an external party obtained and misused Okta’s support service ...

2024 SaaS Security Forecast
Beverly Nevalga, Sr. Content Marketing Manager @ AppOmni | | Blog, identity, Okta, SaaS Security, SaaS Security Posture Management
Read the 2024 SSPM predictions from 5 cybersecurity thought leaders around disclosures, AI-provoked breaches, third-party attacks, and misconfigurations. The post 2024 SaaS Security Forecast appeared first on AppOmni ...

Okta Screws Up (Yet Again) — ALL Customers’ Data Hacked, not just 1%
Richi Jennings | | 2 factor auth, 2-fa authentication, 2-factor authentication, 2fa, 2FA Authenticator, 2FA/MFA, auth, Authentication, CIAM, ciam authentication, ciam solution, ciam solutions, ciam vs iam, cloud IAM, Cloud IAM architecture, Cloud IAM as a Service, cloud IAM platform, Cloud IAM Solution, hosted single sign-on, iam, Identity as a service and single sign on, Identity management and Single sign-on, MFA, MFA rollout, Multi-Factor Authentication (MFA), Okta, okta alternative, Okta replacements, Okta SSO, replace okta, Saasure, SB Blogwatch, single sign on, Single Sign On (SSO), sso, two-factor-authentication.2fa, web application single sign on
You had one job: Last month’s sheer incompetence descends this week into UTTER FARCE ...
Security Boulevard