Industry Insight

Industry Insight

Security and sustainability through people, processes, and technology

This is the third in our blog series on trust/security and human rights. Visit our first blog, Beyond Compliance: Elevating Okta’s ESG with security and trust, to learn more about Vice President of Security Trust and& Culture Ben King’s take on what trust means to him, his team’s mandate, and more. Visit our second blog, 3 ways Okta can help…

Unlock SaaS growth with enterprise-ready identity

If you’re building a SaaS product for the enterprise market, identity can no longer be an afterthought. It needs to be an essential part of your product strategy. In this post, we’ll walk through how the identity landscape is shifting and what enterprise buyers are demanding. We’ll also cover how you can use secure, standards-based integrations to…

The problem with legacy thinking around identity security

You’ve probably heard the phrase “identity is the new perimeter.” It’s repeated often in security circles, and for good reason. In most companies, identity has long been considered a supporting function. It’s treated as a gateway to systems, a set of policies to manage access, and a line item on the security checklist.  But the landscape has…

Identity is the target

The “Big Store” con In 1822, a British ship landed on the coast of Honduras carrying 70 settlers eager to start a new life. The passengers of the Honduras Packet had paid handsomely to sail to the bustling town of St Joseph, a settlement of 20,000 people boasting a theater, an opera house, and a domed cathedral. St Joseph was the capital of the…

Key insights from Okta's CSO survey: Challenges and opportunities for Okta Ventures portfolio

Okta Ventures invests in founders building across a range of IT, security, consumer, and enterprise domains. In our discussions with portfolio founders, shared customers, and industry experts, we’re in a privileged position to hear first-hand about new trends, challenges, regulations, and technology shifts as they unfold and affect security…

What a change of power in Washington means for cybersecurity

Four days before the second inauguration of President Donald Trump, his predecessor President Joe Biden issued an executive order that aimed to create a national cybersecurity strategy across federal agencies, private businesses, and critical infrastructure sectors. While President Trump has been quick to roll back other executive orders in his…

How Okta mitigates OWASP’s Top 10 Non-Human Identity Risks

Non-human identities (NHI), including machine identities, service accounts, API keys, and automation tools, play a critical role in modern cloud environments and enterprise applications. Yet, the proliferation of secrets—like hardcoded credentials, tokens, and certificates—introduces security risks that can be exploited if not properly managed. As…

Archive