Selections from the top news items this week in the world of identity and application security.
Thousands of etcd installs are leaking secret server keys online
From ZDNet: According to security researcher Giovanni Collazo, a quick query made through the Shodan search engine revealed a total of 2,284 etcd servers which are leaking credentials,…
The alleged attackers used fairly simple tools, techniques and procedures to compromise a new victim organization on an almost weekly basis for over five years.
On March 23, the United States Justice Department unsealed an indictment against nine attackers operating out of Iran, believed to be working on behalf of the Iranian government. The…
Last spring, Okta opened its doors to local students and jobseekers for our inaugural Tech Week. Our global teams – from San Jose to Sydney – hosted career workshops and mentoring sessions for more than 200 visitors from tech education and workforce development nonprofits in our local communities.
We learned a few things from this effort:
…
It’s almost time for thousands of our customers, partners, and industry leaders to join us in Las Vegas for Oktane18. Which means it’s almost time to talk about the big things you’re doing to drive innovation in your organizations. In other words, it’s almost my favorite time of year.
This year, Oktane18 is all about going beyond. We’ve put…
Sara Daqiq, a developer support engineer, is a relentless problem solver in all senses of the word. In her day-to-day, she recreates issues to solve problems customers are facing in custom integrations in what she describes as a “beautiful intersection of soft skills and hard skills”. But beyond that, she is dedicated to solving even bigger…
Selections from the top news items this week in the world of identity and application security.
Europe's New Privacy Law Will Change The Web, And More
From WIRED: On May 25, the power balance will shift towards consumers, thanks to a European privacy law that restricts how personal data is collected and handled. The rule, called General Data…
Selections from the top news items this week in the world of identity and application security.
How Refugees Are Helping Create Blockchain's Brand New World
From Wired: Without legal proof of your existence, you can’t do many things. You can’t vote, and you can’t drive. You can’t start a bank account or access government services. Good luck…
Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organizations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter…
This past week, I had the pleasure of volunteering my time to help with an #OktaforGood initiative: Micro-mentoring at the Accelerate Good Global conference. Micro-mentoring in this case involved discussions with nonprofit leaders that had questions about technology, or running their business. The conversations are limited to 20 minutes each, and…
Authentication is undoubtedly one of the most crucial aspects of cybersecurity today, but our understanding of how to verify users and their actions has been largely unchanged for decades. It always works the same: the user provides something they know (password), have (ID), or are (fingerprint) and if this input matches what the system knows…