The problem with legacy thinking around identity security

You’ve probably heard the phrase “identity is the new perimeter.” It’s repeated often in security circles, and for good reason. In most companies, identity has long been considered a supporting function. It’s treated as a gateway to systems, a set of policies to manage access, and a line item on the security checklist.  But the landscape has…

Okta joins Google Cloud and industry leaders to build an open, secure AI ecosystem with MCP

Okta joins Google Cloud and industry leaders to build an open, secure AI ecosystem with MCP While AI-driven security operations promise to augment human expertise and automate complex tasks, this potential is often hindered by integration gaps between the diverse tools security teams rely on daily.  That’s  why we’re excited to support Google…

Device flow and Okta: Shared device authentication for consumers

Authentication with shared devices comes with a unique set of challenges. Some scenarios are specific to an organization's workforce whereas some use cases are consumer specific. In this article, I will focus on the consumer scenarios, and explore the challenges and possible options to address shared device authentication securely. Challenges with…

Identity 25 U.S. Public Sector honorees: Part 2, Bridging academic innovation and government implementation

The Identity 25 report celebrates individuals driving innovation in digital Identity. Following our spotlight on Ryan Galluzzo and Hanna Kim's contributions to the public sector, we turn to two leaders whose work impacts state, local, and education sectors: Teresa Wu of IDEMIA and Dan Boneh of Stanford University. Wu and Boneh represent essential…

Identity Threat Protection with Okta AI 

Real-time, inline protection that keeps pace with your business Today's complex Identity threat landscape demands streamlined security practices and an evolving, multi-layered defense-in-depth strategy to identify and mitigate cybersecurity threats. Okta’s comprehensive security strategy addresses these threats at multiple levels, including at the…

Archive

Follow Us
Share on Linkedin Share on Youtube