Verifying the Identity of your remote workforce

Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security posture and programs that support its over 19,000 customers. Charlotte has an extensive background in the delivery of security transformation…

Okta wins AWS Global Marketplace Partner of the Year

  Today at AWS re:Invent in Las Vegas, Okta solidified its position as a leader in the Identity space by claiming two prestigious global awards and earning recognition as a finalist in another. These accolades represent a significant milestone in Okta's partnership with AWS and reinforce its commitment to a partner-first growth strategy. They…

The weakest link: Securing your extended workforce

Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security postures and programs that support its over 19,000 customers.  Charlotte has an extensive background in the delivery of security transformation…

Migrating off legacy Tokio at scale

The engine that drives millions of Okta Workflows executions each day was an early adopter of the async Rust ecosystem. While Tokio is the natural choice for an async runtime today, we launched Workflows before the release of Tokio 1.0, and well before the best practices and patterns for async Rust had really solidified.  This article details how…

Okta Workflows authorized at FedRAMP High: A new era of secure automation for the U.S. Public Sector

Okta Workflows is authorized for Okta for Government High As Okta’s U.S. Public Sector leader, my top priority is supporting our public service providers as they modernize IT to improve efficiency and service delivery. This includes adopting modern tools and creating innovative workflow frameworks that streamline burdensome and time-consuming…

Introducing Log Investigator: Transform your security operations with AI-powered log analysis

Detecting and responding to potential Identity security threats is no longer simply an advantage in modern cybersecurity but a necessity. At the same time, as organizations scale their digital operations, Identity security practitioners need access to a richer and more complex set of identity log data than before — one demanding constant attention…

Implementing security best practices in Okta developer orgs

How we’ve fortified security in Okta Developer Edition Service Securing customer-facing services or developer playgrounds is paramount in this age of software development. This post discusses various strategies and measures that we have adopted to fortify our Developer Edition Service. Join us as we walk you through our journey of establishing…

Spotlight on Dr. Peter Scheuermann: A story of perseverance, continuous learning, and community

According to ISC2, the global cybersecurity workforce gap stands at a staggering 4.8 million jobs, with 90% of organizations identifying critical skill shortages in areas like AI, cloud computing security, Zero Trust implementation, digital forensics and incident response, application security, and penetration testing. Programs like What’s Next by…

3 ways Okta can help you improve your security posture and respect privacy-forward human rights

This is the second in our blog series on trust/security and human rights. You can find our first blog here. Identity is the connection between people and technology, and it’s the front door to all digital interactions. As the threats we face evolve, Identity has become increasingly important to our communities and workplaces. Cybercriminals are…

Help reshape Identity security: Join the IPSIE working group 

At Oktane this year, we announced that the OpenID Foundation (OIDF) has launched a working group devoted to creating the first unified enterprise Identity security standard. Called Interoperability Profiling for Secure Identity in the Enterprise (IPSIE), the group aims to tackle key challenges that underlie Identity security in today's enterprise…

Archive

Follow Us
Share on Linkedin Share on Youtube