API security

API security is the cornerstone of a connected business’ identity and access management strategy. As more apps move into the cloud and connections between services become standard, APIs drive business growth, connect clients with their customers, and stimulate technological advancement. A comprehensive strategy for APIs requires thoughtful security measures.

An Insider’s Take on API Strategy

We recently performed a survey to take the pulse of our community on their own API strategies. Our goal was to change and possibly debunk our own assumptions, and replace them with real-world perspectives from customers and partners working on these things day in and day out. In short, we validated that the fast adoption and sheer volume of APIs…

Okta’s Annual 12 Days of Customers

As we prep our holiday shopping lists and pull out the festive sweaters, it’s almost time to look back on 2018. We want to use this season of reflection and cheer to showcase some of our many amazing customers. Our customers are the best gifts of all, so we’re celebrating with our annual 12 Days of Customers! JetBlue: The airline with a mission…

Build vs. Buy: The Value of MFA Implementation Through APIs and SDKs

Developers need to make their cloud-native applications secure, which can demand a lot of resources and take their focus off the core functionality of an app. But building security into an app doesn’t need to be challenging or time-consuming. Leveraging APIs and SDKs means developers can strengthen an app while actually reducing their workload. By…

The Power and Responsibility of your API

While the internet lights up with terrifying costume ideas every October, what we find truly scary are the security breaches that have hit major companies in recent months. Luckily, we have National Cybersecurity Awareness month to provide focus and resources toward a safe and secure internet. To celebrate and observe the month, our diverse team…

API Security in the Wild

“[Company] suffers data breach, millions of customer affected” Everybody has seen this headline multiple times. Most recently, it was T-Mobile, but in the last three years that has also been Instagram, Facebook, Tinder, Air Canada, Panera, the IRS, and the most devastating of all, Equifax. Those are just the ones we know about. Luckily, the T…

I Snuck a Bad Apple into the Basket, and Nobody Noticed

Imagine the havoc a sophisticated threat actor could wreak by tricking a user into downloading and executing malicious code that current security products deem as safe. They can get access to personal data, financial details, or sensitive insider information. That scenario is precisely what could happen based on new research published today from…

Navigating the New Perimeter

As corporate employees are now regularly accessing their enterprise applications and data from mobile devices and cloud applications, the traditional idea of the enterprise network boundary is vanishing. Enterprises are grappling with the reality where the network perimeter is defined by the employee identity. Securing this “Identity Perimeter”…

The marriage of user experience and security

It’s almost Valentine’s Day, so everyone is talking about love — us included. Here at Okta, while we’re certainly swooning over roses, wine, and chocolates, what we really hold near and dear are our relationships with customers and the experiences they have with our technology. We obsess over uniting two seemingly divorced characteristics —…

Public or Private Cloud? Either Way, It’s All About App Security

CIO.com recently ran an interesting story on public vs. private clouds and the importance of cloud security. The article quotes Chris Swan, UBS’ security CTO, on the limitations of the public cloud in the enterprise. Swan predicts the emergence of private clouds, tailored to particular industries, which will compete with the public cloud for the…

Archive