Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

What is Continuous Authentication?

Read More

Deconstructing the DOJ Iranian Hacking Indictment

Read More

Compliance

Privacy

Research

Management

The Case for Securing your B2B Connections

Whether you’re a clothing company integrating with an online shopping platform, a kitchen appliance manufacturer offering smart interfaces, or a nutritional supplement provider releasing a health app, these days every company is a technology company.

In this new business landscape, innovation goes hand-in-hand with collaboration, as more and more...

OAuth: When Things Go Wrong

Picture this: you sign up for a new app, and it asks if any of your friends are using it. In order to find out, the app asks for your email address...and your password. While it seems ludicrous now, this was once considered a normal user flow. But many apps...

Embracing the Kanyes of Our Organization

Let’s talk about Kanye.

You might remember that he was featured on international news when he entered his phone password on live TV. But the part that earned him national mockery was the password itself: 000000.

It’s easy to laugh at the example he set, but, unfortunately, his...

A Path to Achieving Network Security ZEN

As new philosophies around network security arise alongside ongoing technological advances, forward-thinking companies are changing the way users interact with—and feel about—network security as part of their work day.

People are the new perimeter

Up until recently, network security relied upon a network perimeter—anything inside the perimeter...

How FIDO2 + WebAuthn Offer a Seamless, Secure Login

For those not familiar with FIDO2, it is an improved version of the FIDO standard – popularly known for the U2F USB tokens provided by Google and Yubico. In this post, I’ll break down how you can leverage a new feature available within Okta, WebAuthn with FIDO2 , to enhance...

What is Credential Stuffing?

Malware often gets top billing in mainstream news reporting of cyber-threats. It makes for snappy headlines and a compelling narrative—–but it’s not the whole story. Increasingly, organizations are finding customers exposed to malware-free account takeover attacks, which could result in serious data theft.

There are several ways hackers can...