Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

What is Continuous Authentication?

Read More

Deconstructing the DOJ Iranian Hacking Indictment

Read More

Compliance

Privacy

Research

Management

What Is Identity Proofing?

Every day, we engage with an ever-growing number of applications and digital services—and each of them wants to know (and validate) that we are who we say we are. As companies try to combat the prevalence of large-scale data breaches, the adage ‘on the internet, nobody knows you’re a...

Microservices vs. SOA—What’s the Difference?

There are a number of things that help make an application what it is—the most fundamental of which is the architecture it’s based on. To date, most technology has been built on monolithic architecture, with all components existing within one complex application. More recently, however, developers have started compartmentalizing...

Vulnerability Disclosure at Okta: Everything You Need to Know

Protecting our customers, partners, and other stakeholders has always been the Okta Security Team’s top priority . We have invested heavily in our security infrastructure in support of this mission, building a top-of-class internal application, and instituting both offensive and defensive security teams.

But with every endeavor, it’s...

Shift Identity Left: Secure DevOps Automation with Okta

To keep up with the rapid pace of innovation, organizations of all kinds and sizes are adopting DevOps practices to better automate the delivery and operations of software in the cloud.

A cultural phenomenon that impacts people and process as much as it does technology, DevOps brings teams together...

Don’t Get Pwned: Stop Identity Hacks With Multi-Factor Authentication

“Have I been pwned?” It’s a question you’ve probably asked yourself before. Phishing and stolen credentials are still among the primary threat methods in breaches, and as hackers grow more sophisticated, employees and consumers have to get smarter about the credentials they use to access digital applications. On the flip...

The Impact of Quantum Computing on Cybersecurity

Quantum computing is a f ast-emerging area of computer science that is upending the foundations of cybersecurity. It’s set to change how we secure our everyday communications, process credit cards, store data, and securely connect to websites. But it’s also likely to disrupt modern security as we know it....

There’s No Place for Passwords in the Future of Work

Everyone has probably had this experience at some point: you set up an account for a work application—and the next time you need to use it, you’ve forgotten the complex password the application required. For today’s workforce, the erosion of trust in technology starts with the unreliability of a system...