Identity in the News – Week of March 26, 2018

Selections from the top news items this week in the world of identity and application security. Thousands of etcd installs are leaking secret server keys online From ZDNet: According to security researcher Giovanni Collazo, a quick query made through the Shodan search engine revealed a total of 2,284 etcd servers which are leaking credentials,…

Deconstructing the DOJ Iranian Hacking Indictment

The alleged attackers used fairly simple tools, techniques and procedures to compromise a new victim organization on an almost weekly basis for over five years. On March 23, the United States Justice Department unsealed an indictment against nine attackers operating out of Iran, believed to be working on behalf of the Iranian government. The…

Opening Up Pathways into Tech

Last spring, Okta opened its doors to local students and jobseekers for our inaugural Tech Week. Our global teams – from San Jose to Sydney – hosted career workshops and mentoring sessions for more than 200 visitors from tech education and workforce development nonprofits in our local communities. We learned a few things from this effort: …

Oktane18: Welcome to Beyond

It’s almost time for thousands of our customers, partners, and industry leaders to join us in Las Vegas for Oktane18. Which means it’s almost time to talk about the big things you’re doing to drive innovation in your organizations. In other words, it’s almost my favorite time of year. This year, Oktane18 is all about going beyond. We’ve put…

Identity in the News – Week of March 19, 2018

Selections from the top news items this week in the world of identity and application security. Europe's New Privacy Law Will Change The Web, And More From WIRED: On May 25, the power balance will shift towards consumers, thanks to a European privacy law that restricts how personal data is collected and handled. The rule, called General Data…

Identity in the News – Week of March 12, 2018

Selections from the top news items this week in the world of identity and application security. How Refugees Are Helping Create Blockchain's Brand New World From Wired: Without legal proof of your existence, you can’t do many things. You can’t vote, and you can’t drive. You can’t start a bank account or access government services. Good luck…

5 Identity Attacks That Exploit Your Broken Authentication

Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organizations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter…

Micro-Mentoring Nonprofit Entrepreneurs at Accelerate Good Global

This past week, I had the pleasure of volunteering my time to help with an #OktaforGood initiative: Micro-mentoring at the Accelerate Good Global conference. Micro-mentoring in this case involved discussions with nonprofit leaders that had questions about technology, or running their business. The conversations are limited to 20 minutes each, and…

What is Continuous Authentication?

Authentication is undoubtedly one of the most crucial aspects of cybersecurity today, but our understanding of how to verify users and their actions has been largely unchanged for decades. It always works the same: the user provides something they know (password), have (ID), or are (fingerprint) and if this input matches what the system knows…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube