Assessing Where Your Organization Lies on the Zero Trust Maturity Curve

Most of us are now familiar with the term “Zero Trust”, seeing it emblazoned on many a booth and bus at security conferences throughout the year. The term has certainly reached buzzword status, and with good reason: today, security leaders recognize more than ever the need to move away from a perimeter-oriented approach to security. But putting a…

Okta’s Core Values: Empower Our People with Alice Marsh

Our people are our identity, and we’re fortunate enough to have a vibrant, passionate group of them. Our final core value is to “Empower our people” to be their best selves, both inside and outside of the workplace. Alice Marsh, recruiting coordinator hiring in EMEA, embodies this core value through focusing on a candidate’s whole journey and…

The Dogfooding Chronicles: WebAuthN—The Path to Passwordless

  In this edition of The Dogfooding Chronicles, we’re going to highlight an implementation we’re very excited about around here. Ever heard of WebAuthN? Read on to learn some tips and tricks we’ve learned in our WebAuthN enablement journey. Setting the stage – what is WebAuthN? Web Authentication API, aka WebAuthN, is one of the newest web…

How Do I Validate Proper Compliance?

Love it or hate it, paying taxes is a staple of life for people all over the world. Disclosing and proving payment of those taxes to the government is an equally accepted practice—you can’t simply assume they know you are doing so. Similarly, when it comes to compliance, it’s vital for companies to prove to governing bodies that they are…

Secure Partner Onboarding Means Automating User Access

Imagine this: you’re in your house, and you notice some water coming through the ceiling. One of your pipes is leaking. To fix it, you call your plumber to change the pipe, a handyman to patch up the ceiling, and a painter to cover the spackle. Once they’re done with their work and you walk them out of your house, you need to ensure they no longer…

What is an Offensive Security Team?

In 2018, hackers stole half a billion records—an increase of 126% on the year prior, which translates to 3.8 million records per day. Ransomware is an ever-increasing threat, geopolitical tensions are being played out online, and corporate and government security systems are struggling to compete with the sophisticated modern cybercriminal. To…

Supporting Your People: Your Story Inspires with Tanya Benvenuto

From partnering with our CEO, to coaching other executive assistants, Tanya Benvenuto, Okta’s director and chief executive assistant, embodies the power of supporting others. In this edition of Your Story Inspires, Tanya shares how she pushed through the challenge of being a young, single parent with the help of her mentor, and how she uses that…

How to Unlock Security Orchestration through Identity

Corporate data is a popular target for hackers, with over 9,600 breaches recorded between 2008-2019 in the U.S. alone. Not only are attacks growing in volume, but also in sophistication: A study by the Identity Theft Resource Center (ITRC) indicates that account takeovers increased by 79% between 2017 and 2018. Devastating attacks like these can…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube