We're Hiring:

Category Archives: Security

Update from Okta – Heartbleed

You’ve likely read about the Heartbleed vulnerability that has affected much of the Internet. The short version: Heartbleed is a bug that affects the way online services encrypt connections between their service and their users, and if not corrected can … Continue reading

Cloud Framework Panel Recap: “Started From the Bottom, Now We’re Here”

It’s not every day that a panel we’re involved in will prompt coverage with Drake lyrics. And yet, just that happened last week after our CSO David Baker participated in a panel on the ‘New Cloud Framework’ with executives from … Continue reading

Making Security Concerns a Thing of the Past: New Cloud Framework Panel

At Okta, we know that the cloud has become the standard for enterprises, making it easier to manage applications, mobility and the data sprawl involved with those apps and devices. And yet, with cloud adoption comes security concerns – another … Continue reading

Building Trust and Security Through Transparency of Service

Transparency is a great way for cloud providers to demonstrate and prove good security practices to their customers. Often times, however, the transparency stops when outages or service hiccups occur. During an incident, how a cloud provider communicates to its … Continue reading

Top 10 Reasons Valentines are Like Passwords

Happy Valentine’s Day from the Okta team! We’ve had some fun thinking about chocolate, flowers and all things Enterprise Identity Management and came up with the Top 10 11 reasons valentines are like passwords. Enjoy! You get in trouble if you … Continue reading

Securing Layer 7 – Part 2: Application Vulnerability Management

I recently kicked off a blog series about the importance of securing Layer 7, otherwise known as the application layer in the OSI model. It’s a critical part of Okta’s security program because Layer 7 is closest to our users, … Continue reading

Securing Layer 7: The Closest Point to the End User

Building and maintaining Okta’s security program is an interesting job, to say the least. The stakes are high: Not only is identity management core to IT, it is central to an enterprise’s security. Plus, Okta delivers IDM from the cloud, … Continue reading

Forget Disaster Recovery, Let’s Talk Disaster Avoidance

“What’s your disaster recovery plan?” It’s a question I’ve been getting from customers quite a bit lately. And it caught me off guard the first time I heard it. Typically, inquiries on disaster recovery come from someone on an audit … Continue reading

Keeping it Simple to Keep it Secure

The New York Times recently ran an interesting profile of Peter Neumann, one of the preeminent computer scientists in the world. The story, “Killing the Computer to Save it,” details Neumann’s ideas for how to solve the inherent security vulnerabilities … Continue reading

Encryption in the Spotlight due to Vulnerable Android Apps

Last week, Ars Technica’s Dan Goodin published a story detailing how downloaded Android applications have the potential to expose the sensitive personal data of more than 185 million users.  Vulnerabilities due to inadequate or incorrect use of SSL/TLS protocol libraries … Continue reading

← Older posts