Identity in the News – Week of March 26, 2018

Selections from the top news items this week in the world of identity and application security. Thousands of etcd installs are leaking secret server keys online From ZDNet: According to security researcher Giovanni Collazo, a quick query made through the Shodan search engine revealed a total of 2,284 etcd servers which are leaking credentials,…

Deconstructing the DOJ Iranian Hacking Indictment

The alleged attackers used fairly simple tools, techniques and procedures to compromise a new victim organization on an almost weekly basis for over five years. On March 23, the United States Justice Department unsealed an indictment against nine attackers operating out of Iran, believed to be working on behalf of the Iranian government. The…

Opening Up Pathways into Tech

Last spring, Okta opened its doors to local students and jobseekers for our inaugural Tech Week. Our global teams – from San Jose to Sydney – hosted career workshops and mentoring sessions for more than 200 visitors from tech education and workforce development nonprofits in our local communities. We learned a few things from this effort: …

Oktane18: Welcome to Beyond

It’s almost time for thousands of our customers, partners, and industry leaders to join us in Las Vegas for Oktane18. Which means it’s almost time to talk about the big things you’re doing to drive innovation in your organizations. In other words, it’s almost my favorite time of year. This year, Oktane18 is all about going beyond. We’ve put…

Identity in the News – Week of March 19, 2018

Selections from the top news items this week in the world of identity and application security. Europe's New Privacy Law Will Change The Web, And More From WIRED: On May 25, the power balance will shift towards consumers, thanks to a European privacy law that restricts how personal data is collected and handled. The rule, called General Data…

What is Multi-factor, or Two-factor Authentication?

Passwords aren’t good enough. Securing your enterprise can seem like a daunting task. In the past, companies were comfortable with the standard username- and password-based authentication to all apps and services, with no additional methods of authentication or authorization. Access to corporate resources was protected by firewalls and VPNs. Here…

Replace Your Complicated VPN with Cloudflare Access and Okta

“I love connecting to the corporate VPN!” said no one ever. If you work from an office or a remote location far away from the VPN server, you will practice patience waiting for internal applications to load. If you want to browse something on your phone, you’re going to jump through a few hoops before you connect. And anytime VPN hardware goes…

Identity in the News – Week of March 12, 2018

Selections from the top news items this week in the world of identity and application security. How Refugees Are Helping Create Blockchain's Brand New World From Wired: Without legal proof of your existence, you can’t do many things. You can’t vote, and you can’t drive. You can’t start a bank account or access government services. Good luck…

5 Identity Attacks That Exploit Your Broken Authentication

Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organizations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter…

Archive

Follow Us