This is your quick guide to conducting a water-tight user access review, passing your end-of-year IAM audits, and safeguarding your organization from identity threats before 2025 comes around. With the year drawing to a close, it’s the perfect time to
Bypassing Okta’s Passwordless MFA: Technical Analysis and Detection Authentication security has always been a key area in the battle between defenders and attackers. Security vendors continuously implement new controls to safeguard authentication processes, but attackers soon discover methods to circumvent
Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s IAM Summit will unfold in the vibrant city
Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures. As winter crept in last year, so did identity threat actors. Microsoft revealed in January that the Russia-backed group
We break down 10 key security configurations and features to ensure robust authentication and identity management within your Okta instance to help prevent future attacks.
On October 19, 2023, Okta notified its customers of a security breach involving unauthorized access to their support system. This incident occurred when an external party obtained and misused Okta’s support service account credentials. The investigation by Okta pinpointed the