Introducing Okta's Identity Adoption Model for Zero Trust

While the term “Zero Trust” is ubiquitous enough to feel like a buzzword, adoption of the security framework is not as widespread as you might think.  The security industry has been discussing the reality of the shifting perimeter for nearly two decades, with origins back to the Jericho Forum, an international group working to define and promote…

Cyber Security Awareness Month: The Problem with Passwords

Passwords are a fixture of our modern digital world that cause no end of frustration and angst. I am sure this scenario is a familiar one: ‘Incorrect password, please try again’<forgot password>‘Please enter a new password’<input incorrect password (because, hey, it wasn’t the right one anyway)>‘The password you have entered has…

Cyber Security Advocate: Meet Tanesha Magby

Organizations today face increasingly diverse and sophisticated cyber threats. This work is bigger than any one entity; it forms part of a collaborative global initiative to make the internet a safer place. For Cybersecurity Awareness Month, we’re going behind the scenes with some of Okta’s Cyber Security Advocates, a talented group of…

Cyber Security Advocate: Meet Nicole Cato

Organizations today face increasingly diverse and sophisticated cyber threats. This work is bigger than any one entity; it forms part of a collaborative global initiative to make the internet a safer place. For Cyber Security Awareness Month, we’re going behind the scenes with some of Okta’s Cyber Security Advocates, a talented group of…

Cyber Security Awareness Month: 4 Ways to Participate

We live in a world of modern digital companies and users have never had so much freedom. We can build anything with cloud apps and services. We can work from anywhere. Learn from anywhere. Shop and surf from anywhere, on any device. But so can the bad guys. What is Cyber Security Awareness Month? Back in 2004 when more of the global interactions…

MFA Fatigue: A Growing Security Concern

The internet has never faced so much existential risk from people who want to harm companies and their users. While many organizations understand that there’s a link between identity and security, few fully grasp how foundational identity is to a modern security strategy. Organizations with gaps in their identity security are significantly more at…

Reflections on Security: Looking Ahead

As we continue deeper into 2022, facing many of the challenges we saw in 2021 (see Reflections on Security: Looking Back at 2021), optimism may seem difficult. How do we know the next evolution of identity and security practices will be enough? And this time of year always sees a flurry of predictions on what trends will emerge and what should be…

Reflections on Security: Looking Back at 2021

As we exited a difficult 2020, we did so with lessons and learnings we were hoping would guide us better in 2021. There was a new focus towards a hybrid working environment that was also secure. This shift required a modernization of infrastructures, the adoption of new technologies, and innovative ways to automate, orchestrate, and reduce overall…

Is Establishing a Robust IAM Practice Tactical or Strategic?

Verizon’s 2021 Data Breach Investigations Report found that privilege abuse is still the leading cause of breaches today. As cyber-attacks targeting identity (such as business email compromise or phishing) have become more sophisticated and numerous, many organizations are increasing their focus and budgets to combat them using Identity and Access…