Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Passwordless Authentication: Where to start

Read More

Okta Device Trust: Get the Most out of Integrating Identity + Endpoint Management

Read More

Compliance

Privacy

Research

Management

The Case for Host Security Logs

In this post, I will be discussing an important and fundamental topic of information security. Namely, I will focus on the relative value differences between various sources of security data and why host security logs are at the top of my list when establishing a security program.

...

What is Phishing?

In today’s increasingly digital environment, employees and contractors can sign into workplace applications and systems from anywhere with a simple set of credentials. And while this might make things easier for employees and contractors alike, it also puts organizations at heightened risk of a specific form of cybercrime: phishing....

What is GLBA compliance?

The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Modernization Act of 1999, is a United States Federal law that was originally enacted to modernize the financial industry. The law mandates that financial institutions disclose their information-sharing practices to their customers and proactively secure sensitive data.

The Two...

Data Privacy Day: 5 Tips to Help Keep your Private Data Private

As new technologies continually integrate themselves deeper into the lives of average consumers, these users increasingly benefit from the enhanced productivity and convenience that these technologies offer. That being said, knowing how to leverage these technologies in a way that optimizes personal privacy isn’t always intuitive for the average...

By Okta Privacy & Product Legal Team

3 On-Prem Security Myths Debunked

As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we...

AI Is Changing Security—Here’s How

Cybercriminals have evolved from lone hackers targeting small websites and systems into dangerous entities launching large-scale cyberattacks that affect millions of people worldwide. In recent years, we’ve seen multiple huge ransomware attacks like WannaCry and ...