“Choice, not chance.”
While simplistic on the surface, Jami Baker’s driving motto — learned after years playing college basketball despite her 5’2” frame — is her formula for success. “I’ve always set goals and worked hard to achieve them,” Baker, Identity and Access Management Engineer and Okta SME for Michigan State University, says.
Baker took…
Trust has always been at the heart of healthcare. We entrust our most personal and sensitive information to healthcare providers throughout our lives. In return, we expect these organizations to take good care of it, use it wisely, and allow us to access it whenever we want. After all, it is our data.
And there’s a lot of it: A staggering 30% of…
How we’ve fortified security in Okta Developer Edition Service
Securing customer-facing services or developer playgrounds is paramount in this age of software development. This post discusses various strategies and measures that we have adopted to fortify our Developer Edition Service. Join us as we walk you through our journey of establishing…
Launch Week is here again, and this time around we have a special Oktane edition. As usual, you’ll learn about our newest innovations, but you’ll also get a sneak peek into exciting developments that will be available in the coming year.
Let’s dive in.
Okta Workforce Identity Cloud
Identity has become the organizational security linchpin, and…
Technology is unlocking opportunities and business outcomes like never before, but it’s also introducing complexity and potential risk for organizations.
When a biomedical engineering team spins up new AI models, they could drive business outcomes like accelerating a clinical trial for a new vaccine. At the same time, IT and security teams have…
Identity is under attack. Over 80% of data breaches involve compromised Identity,* the main enterprise security entry point for workforce and consumer applications.
Lack of standardization is a major reason for this. Without a unifying industry standard for Identity Security that provides full visibility into every part of the technology stack,…
As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system.
Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy…
Okta is constantly evolving our cloud infrastructure to meet the needs of our customers. We place reliability and scalability at the core of our design decisions for services that process billions of authentications per month. This article dives into how a recent project to remove one of our most heavily trafficked services yielded significant…
Thoughtworks is a global software consultancy firm with a reputation for tackling tough projects. As Steve Quirke, Identity team lead, explains: “We’re here to build the products that differentiate our customers from the competition. Clients hire us for our ability to digitally transform global enterprises at scale by applying strategic consulting…
Identity governance has traditionally been considered a compliance-first toolset. For businesses looking to adopt an IGA solution, this has meant audit trails, thorough reporting, and access controls. But more recently, IGA’s security-driven role has grown. Savvy CISOs and CIOs recognize how the right solution can help safeguard an organization…