Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security postures and programs that support its over 19,000 customers.
Charlotte has an extensive background in the delivery of security transformation…
The engine that drives millions of Okta Workflows executions each day was an early adopter of the async Rust ecosystem. While Tokio is the natural choice for an async runtime today, we launched Workflows before the release of Tokio 1.0, and well before the best practices and patterns for async Rust had really solidified.
This article details how…
Okta Workflows is authorized for Okta for Government High
As Okta’s U.S. Public Sector leader, my top priority is supporting our public service providers as they modernize IT to improve efficiency and service delivery. This includes adopting modern tools and creating innovative workflow frameworks that streamline burdensome and time-consuming…
Detecting and responding to potential Identity security threats is no longer simply an advantage in modern cybersecurity but a necessity. At the same time, as organizations scale their digital operations, Identity security practitioners need access to a richer and more complex set of identity log data than before — one demanding constant attention…
How we’ve fortified security in Okta Developer Edition Service
Securing customer-facing services or developer playgrounds is paramount in this age of software development. This post discusses various strategies and measures that we have adopted to fortify our Developer Edition Service. Join us as we walk you through our journey of establishing…
According to ISC2, the global cybersecurity workforce gap stands at a staggering 4.8 million jobs, with 90% of organizations identifying critical skill shortages in areas like AI, cloud computing security, Zero Trust implementation, digital forensics and incident response, application security, and penetration testing. Programs like What’s Next by…
This is the second in our blog series on trust/security and human rights. You can find our first blog here.
Identity is the connection between people and technology, and it’s the front door to all digital interactions. As the threats we face evolve, Identity has become increasingly important to our communities and workplaces.
Cybercriminals are…
At Oktane this year, we announced that the OpenID Foundation (OIDF) has launched a working group devoted to creating the first unified enterprise Identity security standard. Called Interoperability Profiling for Secure Identity in the Enterprise (IPSIE), the group aims to tackle key challenges that underlie Identity security in today's enterprise…
State and local government agencies continually seek more cost-effective solutions to protect their sensitive data and improve the user experience of the residents they serve. One essential component in that equation is the increasing need for centrally managed Customer Identity and Access Management (CIAM) tools, says Okta’s first Public Sector…
Decentralized Identity is a methodology that allows individuals to securely control their digital Identity without relying on a central authority.
The need for decentralized Identity
Traditional Identity models do not protect user interests and can leave personal information vulnerable. Decentralized Identity helps close the gap on a growing list…