Okta

Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

What is Continuous Authentication?

Read More

Deconstructing the DOJ Iranian Hacking Indictment

Read More

Compliance

Privacy

Research

Management

I can be Apple, and so can you

A Public Disclosure of Issues Around Third Party Code Signing Checks

Summary:

A bypass found in third party developers’ interpretation of code signing API allowed for unsigned malicious code to appear to be signed by Apple. Known affected vendors and open source projects have been notified...

5 Tips for Using Adaptive Authentication Right

Adaptive Multi-factor Authentication is a powerful feature that adds flexibility to Multi-Factor Authentication (MFA). Depending on your login context – for example, I'm accessing the system from a country I never did before – the MFA authentication is required. In simple words: with Adaptive MFA, depending on your...

By Lindsay Brunner

Use Behavior and Context to Secure Access

The traditional perimeter which protected IT assets on the corporate network has become irrelevant. The proliferation of cloud-based services, such as email and online file sharing, being used to augment conventional inhouse IT systems, and the rise of mobility where remote access from anywhere is required by your...

Security and the API Journey

If you ask most developers “What’s your favorite API?” you’ll get a variety of answers that fall into a few categories. Most people think of APIs that let them accomplish something important or an API that made them feel powerful or an API that made it all click...

Biometrics for Authentication: The Risks and Potential Rewards

In the last ten years, biometric technology has morphed from something Hollywood villains use to secure their secret dungeons to something almost everyone has in their pocket. But while adoption of biometric security has seen explosive success, misconceptions about biometric authentication are still very common. Let's take a...

How Secure is Your VPN?

Operating a corporate VPN solution can be expensive, and sometimes feel like navigating a minefield. With high stakes and a confusing sea of available solutions, mistakes are frequent and costly. Your VPN is a critical layer of defense in your corporate network, and intrusion can have serious consequences. Take...