security

Okta Tech Pathways Week and the Difference Diversity Makes to Cyber Security

At Okta, we believe providing opportunities in technology to historically excluded groups is crucial to building more equitable businesses and communities. That’s why we’ve committed to inclusive actions that empower young people to succeed in tech and build stronger communities worldwide. We’re highlighting the work that we do throughout Cyber…

Cyber Security Advocates: Meet Jameeka Green Aaron

As the ongoing dialogue on threats, standards, and best practices continues to drive awareness of cyber security issues, we noticed something slipping under the radar: the contributions of security professionals working behind the scenes to stay ahead of the curve. To us, cyber security means people, and we’re celebrating the Cyber Security…

Advocates for Change for Cyber Security Awareness Month

The pandemic has prompted massive changes. Over the past 18 months, we’ve adapted and adjusted, implemented new processes and tools, and are acclimating to a “new normal.” While we’ve embraced an entirely new way to work, there is also a spotlight on how to do so securely. But the prevalence of vulnerabilities, exploits, and breaches is not new…

Helping the Public Sector Adopt a Zero Trust Framework: Okta Joins the AWS Summit

Earlier this year I wrote that, in 2021, government security leaders need to adopt a true Zero Trust framework—an approach that ensures the right people have the right level of access, to the right resources, in the right context. And that access must be assessed continuously—all without adding friction for the user. Meanwhile, it should add as…

What Is Two-Factor Authentication (2FA)? 

Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network. Think of your most recent login…

5 Key Takeaways from Our 2021 State of Zero Trust Security Report

How important is it to implement Zero Trust? We asked over 600 business and security leaders across North America, Asia Pacific (APAC), Europe, the Middle East, and Africa (EMEA)—and the overwhelming consensus is that it has become crucial. With the unprecedented shift to remote work, the adoption of new digital products and services, and the…

What are Salted Passwords and Password Hashing?

Security is often not top of mind when creating customer-facing applications. But in a landscape of continual data breaches of major corporations like T-Mobile and Google, companies must be vigilant to adhere to security best practices. Processes like password salting and hashing are fundamental to the security posture of your apps. Understanding…

Okta Privileged Access: Unlocking Zero Trust Security at the Infrastructure Level

Every company that operates production software has compliance requirements. The vast majority of those organizations also carry significant infrastructure in the cloud and/or on-premises. And they all require a safe way to provide access to their developer workforce. Traditionally, there were two ways to achieve this: building a DIY system to…

Archive