Opening Up Pathways into Tech

Last spring, Okta opened its doors to local students and jobseekers for our inaugural Tech Week. Our global teams – from San Jose to Sydney – hosted career workshops and mentoring sessions for more than 200 visitors from tech education and workforce development nonprofits in our local communities. We learned a few things from this effort: Opening…

5 Identity Attacks That Exploit Your Broken Authentication

Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organisations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter…

What is Continuous Authentication?

Authentication is undoubtedly one of the most crucial aspects of cybersecurity today, but our understanding of how to verify users and their actions has been largely unchanged for decades. It always works the same: the user provides something they know (password), have (ID), or are (fingerprint) and if this input matches what the system knows…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube