Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Data Protection

AI Is Changing Security—Here’s How

Cybercriminals have evolved from lone hackers targeting small websites and systems into dangerous entities launching large-scale cyberattacks that affect millions of people worldwide. In recent years, we’ve seen multiple huge ransomware attacks like WannaCry and ...

Using SIEM and Identity to Protect Against Data Breaches

“We are what we repeatedly do“ is a common paraphrase of Aristotle—though if he were around today, his sentiment might be more like “we are what we search, click, or connect to.” As security professionals well know, there’s a lot to learn from how we use technology.

The interactions...

Your Official Guide to DEF CON Threats

As the head of security for DEF CON, I’ve seen a lot of articles (and a bit of scaremongering) around the threats at the event. While DEF CON is a technically hostile environment, I promise, it is not a dystopian wasteland. A little common sense goes a LONG way....

How Okta Helps You Comply with PCI-DSS 3.2

As organizations continue to move critical services into the cloud, having strong, centralized identity becomes the foundation of a holistic security strategy. Continuing our efforts to support customers who use Okta to protect Cardholder Data Environments, we are pleased to announce that Okta has released a PCI-DSS Attestation of...

Two Months In: How Are Companies Being Impacted by the GDPR?

Online data privacy has always been a controversial topic. The fact that users store data with third parties has demanded increased transparency on how these platforms actually store and process personal data. Data breaches resulting in compromised personal information have added fuel to the fire, proving that privacy concerns...

How Secure is Social Login?

Social login gives application users the ability to apply existing login information from their social media accounts to register and sign into third-party sites. But before we jump into the topic of whether social login is secure or not, let’s answer the question below.

Do users really want...