The Production Line: HealthInsight

Here at the The Production Line, we really enjoy digging into a little history. But this month, we’re pointing up a feature we just demoed at our Showcase event earlier this month. It’s called HealthInsight. This Early Availability (EA) feature started life as a beta in June of 2019, then was released as a self-enablement option in October, and…

How to Escape Access Policy Hell with Risk-Based Authentication

As I discussed in my previous post, Okta’s Risk-Based Authentication feature helps organizations overcome the challenges of balancing security with usability. You may have heard a lot about Risk-based Authentication over the past couple of months, and now that Risk-Based Authentication is Generally Available, I want to give an updated overview of…

Assessing Where Your Organization Lies on the Zero Trust Maturity Curve

Most of us are now familiar with the term “Zero Trust”, seeing it emblazoned on many a booth and bus at security conferences throughout the year. The term has certainly reached buzzword status, and with good reason: today, security leaders recognize more than ever the need to move away from a perimeter-oriented approach to security. But putting a…

Okta’s Core Values: Empower Our People with Alice Marsh

Our people are our identity, and we’re fortunate enough to have a vibrant, passionate group of them. Our final core value is to “Empower our people” to be their best selves, both inside and outside of the workplace. Alice Marsh, recruiting coordinator hiring in EMEA, embodies this core value through focusing on a candidate’s whole journey and…

The Dogfooding Chronicles: WebAuthN—The Path to Passwordless

  In this edition of The Dogfooding Chronicles, we’re going to highlight an implementation we’re very excited about around here. Ever heard of WebAuthN? Read on to learn some tips and tricks we’ve learned in our WebAuthN enablement journey. Setting the stage – what is WebAuthN? Web Authentication API, aka WebAuthN, is one of the newest web…

How Do I Validate Proper Compliance?

Love it or hate it, paying taxes is a staple of life for people all over the world. Disclosing and proving payment of those taxes to the government is an equally accepted practice—you can’t simply assume they know you are doing so. Similarly, when it comes to compliance, it’s vital for companies to prove to governing bodies that they are…

Secure Partner Onboarding Means Automating User Access

Imagine this: you’re in your house, and you notice some water coming through the ceiling. One of your pipes is leaking. To fix it, you call your plumber to change the pipe, a handyman to patch up the ceiling, and a painter to cover the spackle. Once they’re done with their work and you walk them out of your house, you need to ensure they no longer…

What is an Offensive Security Team?

In 2018, hackers stole half a billion records—an increase of 126% on the year prior, which translates to 3.8 million records per day. Ransomware is an ever-increasing threat, geopolitical tensions are being played out online, and corporate and government security systems are struggling to compete with the sophisticated modern cybercriminal. To…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube