security

Okta Device Access: Identity-powered security starts at power up

For over a decade, Okta has led the way companies access data and apps in the cloud, allowing organizations to securely transform into modern digital businesses. As we continue to innovate to protect our customers from identity threats like the rise of phishing attacks, we need to ensure they can harness the same technology to secure access at any…

New report reveals trends in secure sign-in

There’s a popular business adage that we’ve found to be pretty credible: “You are what you measure.” No matter how well you may think you understand your customers or your industry, you won’t know for sure until you dig into the data.  At Okta, we’ve seen our users opt for ever more robust sign-in solutions over the past 14 years. But what’s the…

How Okta uses machine learning to automatically detect and mitigate toll fraud

  International revenue share fraud (IRSF), also known as toll fraud, is a type of fraud where fraudsters artificially generate a high volume of international calls/SMS on expensive routes. Here’s how it works. Fraudsters exploit Okta’s authentication flow and make expensive phone calls and/or texts as part of the MFA flow where phone/text is used…

Meet regulatory, framework, and standards obligations with Okta Identity Governance

Meeting compliance challenges in a boundaryless world  Today’s organizations are operating in an increasingly complex technology and business environment. Workforces that may have once been composed solely of in-office employees are now made up of a broad range of contributors, including contractors and business partners, all working across time…

How Identity Serves the Total Army Zero Trust Strategy

In support of the U.S. Department of Defense (DoD) Zero Trust Strategy, the Army is developing a service-specific Zero Trust Strategy, tentatively named “Knights Watch”. To move towards an integrated security architecture, the Army will divest from aging infrastructure, develop trained staff, and lean on industry partners.  Similar to previous…

Automating Security Operations with Okta Workflows

Human actors still drive the vast majority of security breaches. In 2022, 82% of breaches involved the human element, whether it was the use of stolen credentials, phishing, misuse, or simply an error, according to Verizon's Data Breach Investigations. Yet, humans alone cannot protect against these threats. Security automation is critical to…

Archive