Rezonate was recognized as a 2023 Gartner® Cool Vendor™ in Identity-First Security. Learn More.

Blog

Identity Centric Risk Profiling

Introducing Real-Time Identity-Centric Risk Profile – Designed to Help You Outpace Your Attackers

Identities face relentless threats, with attackers often outpacing defenders in speed. Their rapid tactics give them a breakout time of 84 minutes (according to CrowdStrike’s 2024 Global Threat Report1), making the fallout from an identity breach both significant and costly. To counteract these identity-based attacks, Rezonate has launched real-time, identity-centric risk profiling. This innovative approach…

Read more

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Here it is – everything you need to know about using Entra ID’s Conditional Access policies to boost your identity security posture. Read More

10 Takeaways from the 2024 Gartner IAM Summit UK  

I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security. After having ...

Read More

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of ...

Read More
Midnight Blizzard's Microsoft Hack: How ITDR Could Have Helped Microsoft

How ITDR Could Have Helped Microsoft in the Midnight Blizzard Hack

Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures.  As winter crept in last year, so did identity ...

Read More
Top 10 Features to Enhance Okta Security Posture

Top 10 Features to Enhance Your Okta Security Posture 

We break down 10 key security configurations and features to ensure robust authentication and identity management within your Okta instance to help prevent future attacks.

Read More
How Threat Actors Leveraged HAR Files to Attack Okta’s Customers

How Threat Actors Leveraged HAR Files to Attack Okta’s Customers

On October 19, 2023, Okta notified its customers of a security breach involving unauthorized access to their support system. This incident occurred when an external party obtained and misused ...

Read More

MITRE-like Framework for Identity Security

A pivotal shift from perimeter-based security measures is being witnessed in the rapidly shifting landscape of cybersecurity. Identity management is becoming more complex with the move to the ...

Read More

Okta Threat Hunting: Auditing Okta Logs Part 2

Update Note Due to the recent events at MGM, which included the compromise of MGM’s Okta tenant, and the surge in attacks of Okta Admins,  we have updated the threat-hunting ...

Read More