Okta Workflows has reached audit-ready status for Okta for Government High
Every day across the federal government, I speak with top leaders who share a common goal—achieving mission outcomes quickly, securely, and efficiently. This agile strategy is also the U.S. government’s way of making meaningful progress on improving customer service and…
Many federal organizations are meeting cloud computing strategies for persistent access to information by leveraging software-as-a-service (SaaS) technology for their enterprise mission use cases. For the U.S. Department of Defense (DoD), enabling cloud innovation must support data to and from various environments. DoD’s mission capabilities are…
Okta’s first Cyber and Digital Identity Capitol Hill Day took place last week at the U.S. Capitol in Washington, DC. The day began with Okta connecting six CEOs from its portfolio companies with senior staff from the House Homeland Security Committee, House Committee on Oversight and Accountability, and the office of Congressman Bill Foster (D-IL)…
Today, the White House Office of the National Cyber Director released its National Cybersecurity Strategy. Okta applauds the Biden-Harris administration for its work producing this comprehensive strategy, for its close partnership with the private sector, and for advancing the important work of strengthening the nation’s cybersecurity with a focus…
Imagine a scenario where an employee at the United States Department of Health and Human Services is working on a cross-agency project with staff at the Department of Commerce and the State Department.
Employees from the three agencies work together, share research and documents, and draft reports using common collaboration tools. All of the…
A recent report from the Anti-Phishing Working Group (APWG) revealed phishing attacks for the first quarter of 2022 exceeded one million—the highest on APWG record. As attacks increase, it’s reasonable to expect targeted phishing attacks to increase as well.
The U.S. government is defending itself against this growing threat via mandates and…
For organizations and government agencies alike, strong identity management is paramount. Millions of people share sensitive, personal information with commercial and public bodies every day, so companies and public sector agencies have a responsibility to secure their assets.
This is where ICAM and FICAM come in.
What is ICAM?
Identity,…
We often share personal information to obtain the services we need, be it healthcare, financial assistance, or legal advice. In doing so, we place trust in our service providers to keep this data confidential and secure—often without hesitation. When interacting with government agencies, however, we’re usually less confident.
By design, agencies…
Government institutions generally rely on a mix of applications to serve employees and citizens. An institution responsible for insurance, for example, may have different applications for managing group benefits, submitting claims, and applying for extended coverage.
Often, user access to these applications is managed on a decentralized basis…
Doing our errands looks a lot different now than it did a few years ago, and not just because of the COVID-19 pandemic (though that has certainly accelerated things). For a while now, we’ve been ordering groceries online, paying bills on a banking app, and even checking in with our doctor from the comfort of home. With so many digital experiences…