Okta Authentication Policy

The Complete Guide To Okta Authentication Policies

Here it is – everything you need to know about using Okta’s Authentication Policies to enhance your identity security posture. Okta is a leading independent cloud identity provider. It helps you manage user identities, synchronize legacy or on-premises identities to

Okta Verify MFA Bypass

Bypassing Okta’s Passwordless MFA: Technical Analysis and Detection

Bypassing Okta’s Passwordless MFA: Technical Analysis and Detection Authentication security has always been a key area in the battle between defenders and attackers. Security vendors continuously implement new controls to safeguard authentication processes, but attackers soon discover methods to circumvent

GitHub Security Guide: How to Defend Your Organization and Repositories from Supply Chain Attacks

Software supply chain attacks are on the rise, and they’re aiming for your GitHub repository. Here’s how you can protect it by implementing GitHub’s security controls and best practices. Thanks to the popularity of open-source libraries, third-party dependencies, and collaboration

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Here it is - everything you need to know about using Entra ID's Conditional Access policies to boost your identity security posture.

Top 10 Features to Enhance Your Okta Security Posture

We break down 10 key security configurations and features to ensure robust authentication and identity management within your Okta instance to help prevent future attacks.

Okta Threat Hunting: Auditing Okta Logs Part 2

Update Note Due to the recent events at MGM, which included the compromise of MGM’s Okta tenant, and the surge in attacks of Okta Admins,  we have updated the threat-hunting article, adding a few relevant queries to increase visibility surrounding

Maximize Okta Security Posture: Get the Okta Security Booster Kit.  Learn more