Tag: okta
-
Keepit to expand SaaS backup footprint and intelligent automation
Danish cloud backup provider will add Atlassian and Okta support and has plans for intelligent automated restores to customer RPOs and TROs as well a threat library First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366623908/Keepit-to-expand-SaaS-backup-footprint-and-intelligent-automation
-
Tonic.ai product updates: May 2025
Tonic.ai acquires Fabricate, Tonic Textual adds Audio Synthesis, + Okta SSO arrives on Structural Cloud and Textual Cloud! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/tonic-ai-product-updates-may-2025/
-
RSAC 2025 executive interview: Okta’s Charlotte Wylie
Tags: oktaFirst seen on scworld.com Jump to article: www.scworld.com/resource/rsac-2025-executive-interview-oktas-charlotte-wylie
-
Theori and Okta Partner to Advance Identity Security
First seen on scworld.com Jump to article: www.scworld.com/news/theori-and-okta-partner-to-advance-identity-security
-
SC Award Winners 2025 Okta Best Identity Management Solution
First seen on scworld.com Jump to article: www.scworld.com/news/sc-award-winners-2025-okta-best-identity-management-solution
-
The Future of Cloud Access Management: How Tenable Cloud Security Redefines JustTime Access
Traditional approaches to cloud access rely on static, permanent permissions that are often overprivileged. Learn how just-in-time access completely changes the game. The access challenge in modern cloud environments As cloud adoption accelerates, organizations are grappling with a fundamental security challenge: How do you grant people the access they need, such as on-call developers needing…
-
GenAI als Werkzeug für Cyberbetrug: Wie GenAI Nordkoreas IT-Betrügereien unterstützt
Der aktuelle Blogbeitrag von Okta zeigt detailliert auf, wie sich nordkoreanische Betrüger mit Hilfe von KI-gestützten Tools erfolgreich auf Remote-IT-Positionen bewerben. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/genai-als-werkzeug-fuer-cyberbetrug-wie-genai-nordkoreas-it-betruegereien-unterstuetzt/a40590/
-
New Okta Platform features help control surge of non-human identities
First seen on scworld.com Jump to article: www.scworld.com/resource/new-okta-platform-features-help-control-surge-of-non-human-identities
-
Solving the Identity Crisis: Okta Redefines Security in a Machine-Led World
Okta is stepping forward with its boldest platform evolution yet, aiming to unify identity across human and machine actors, and extend zero-trust all the way from cloud to on-premises. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/solving-the-identity-crisis-okta-redefines-security-in-a-machine-led-world/
-
10. Okta Businesses at Work Report – Sicherheitsrisiko Unternehmens-Apps
Tags: oktaFirst seen on security-insider.de Jump to article: www.security-insider.de/sicherheitsrisiko-unternehmens-apps-a-e5d1d68b08b34f8957016bd29541a1b2/
-
How to Improve Okta Security in Four Steps
While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts.Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this First…
-
Okta-Report enthüllt signifikant gesteigerte Erkennungsrate von Cyberbedrohungen in Deutschland
Berichte über Cybersicherheitsvorfälle in Deutschland haben drastisch zugenommen. Einrichtungen der kritischen Infrastruktur meldeten im Jahr 2024 insgesamt 769 solcher Vorfälle an das Bundesamt für Sicherheit in der Informationstechnik (BSI) ein Anstieg um rund 43 Prozent im Vergleich zum Vorjahr. Noch beunruhigender ist, dass 80 Prozent aller Cyberangriffe auf kompromittierte Online-Identitäten zurückzuführen sind. In diesem […]…
-
Who’s using what: Results from the 2025 Okta Businesses at Work report
Tags: oktaFirst seen on scworld.com Jump to article: www.scworld.com/resource/whos-using-what-results-from-the-2025-okta-businesses-at-work-report
-
Okta Exec Sheds Light On Trump’s Cybersecurity Strategy
First seen on scworld.com Jump to article: www.scworld.com/brief/okta-exec-sheds-light-on-trumps-cybersecurity-strategy
-
CrowdStrike and Okta reach AWS Marketplace milestones
Security players underline the volume of sales that can be generated by distributors, MSPs and ISVs on the AWS Marketplace platform First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366619940/CrowdStrike-and-Okta-reach-AWS-Marketplace-milestones
-
7 key trends defining the cybersecurity market today
Tags: access, ai, attack, cisco, ciso, cloud, compliance, control, crowdstrike, cyber, cybersecurity, data, defense, detection, endpoint, fortinet, gartner, google, governance, group, ibm, intelligence, microsoft, ml, network, okta, resilience, risk, service, siem, startup, strategy, technology, threat, tool, vulnerability, zero-trustMarket leaders are gaining share: The cybersecurity market has a dizzying number of single-product vendors, but a handful of powerful platform providers have risen above the pack and are gaining market share.According to research firm Canalys, the top 12 vendors benefited the most from customers taking early steps to transition to platforms. Collectively, they accounted…
-
Die besten XDR-Tools
Tags: attack, business, cloud, computing, container, crowdstrike, cyberattack, detection, edr, endpoint, firewall, google, Hardware, ibm, identity, incident response, infrastructure, mail, malware, marketplace, microsoft, ml, network, office, okta, risk, security-incident, service, siem, soar, software, tool, vulnerabilityLesen Sie, worauf Sie in Sachen XDR achten sollten und welche Lösungen sich in diesem Bereich empfehlen.Manuelles, siloartiges Management ist in der modernen IT-Welt unangebracht. Erst recht im Bereich der IT-Sicherheit: Der Umfang von modernem Enterprise Computing und State-of-the-Art-Application-Stack-Architekturen erfordern Sicherheits-Tools, die:Einblicke in den Sicherheitsstatus von IT-Komponenten ermöglichen,Bedrohungen in Echtzeit erkennen, undAspekte der Bedrohungsabwehr automatisieren.Diese…
-
Customer Identity & Access Management: Die besten CIAM-Tools
Tags: access, ai, api, authentication, business, cloud, compliance, cyberattack, fido, fraud, gartner, iam, ibm, identity, infrastructure, intelligence, login, marketplace, microsoft, okta, privacy, risk, saas, service, toolWir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt.Customer Identity & Access Management (CIAM) bildet eine Unterkategorie von Identity & Access Management (IAM). CIAM wird dazu eingesetzt, die Authentifizierungs- und Autorisierungsprozesse von Applikationen zu managen, die öffentlich zugänglich sind, beziehungsweise von Kunden bedient werden.Geht es darum, die für Ihr…
-
Die besten IAM-Tools
Tags: access, ai, api, authentication, automation, business, ciso, cloud, compliance, endpoint, gartner, governance, iam, identity, infrastructure, login, mfa, microsoft, okta, password, risk, saas, service, tool, windows, zero-trustIdentity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter und -Tools.Identität wird zum neuen Perimeter: Unternehmen verlassen sich immer seltener auf die traditionelle Perimeter-Verteidigung und forcieren den Umstieg auf Zero-Trust-Umgebungen. Sicherer Zugriff und Identity Management bilden die Grundlage jeder Cybersicherheitsstrategie. Gleichzeitig sorgt die Art und Weise, wie sich…
-
Don’t Overlook These 6 Critical Okta Security Configurations
Given Okta’s role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture.With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for…
-
Okta Lays Off 180 In Latest Round Of Cutbacks
Okta has disclosed a major round of layoffs for the third year in a row, with the announcement it will cut 3 percent of its staff. First seen on crn.com Jump to article: www.crn.com/news/security/2025/okta-lays-off-180-in-latest-round-of-cutbacks
-
Okta Carries Out Another Round of Layoffs, Axing 180 Workers
3rd Round of Layoffs in 3 Years Comes as Rival CyberArk Surpasses Okta’s Valuation. Okta will execute its third round of layoffs in three years, cutting 180 employees to reallocate resources toward priorities to drive growth. The San Francisco-based identity security giant on Tuesday shared plans to reduce its staff by 3% in what has…
-
10 top XDR tools and how to evaluate them
Tags: ai, attack, automation, business, cloud, computing, container, corporate, credentials, data, defense, detection, edr, email, encryption, endpoint, finance, firewall, google, guide, Hardware, iam, ibm, identity, incident response, infrastructure, intelligence, malicious, malware, marketplace, microsoft, mitigation, network, office, okta, open-source, organized, risk, security-incident, service, siem, skills, soar, software, spam, technology, threat, tool, training, vulnerability, zero-dayLittle in the modern IT world lends itself to manual or siloed management, and this is doubly true in the security realm. The scale of modern enterprise computing and modern application stack architecture requires security tools that can bring visibility into the security posture of modern IT components and integrate tightly to bring real-time threat…
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
Microsoft, Ping, Okta Dominate Access Management Gartner MQ
Access Management Leaders Remain Unchanged as Customer Identity Cases Proliferate. Advances in customer identity around better user experience, strong authentication, and centralized identity processes have driven rapid growth in the access management market. The space by grew 17.6% to $5.85 billion in 2023 as organizations increasing look to replace homegrown CIAM solutions. First seen on…
-
Organizations Warned of Rise in Okta Support Phishing Attacks
Okta has warned customers that it has seen an increase in phishing attacks impersonating its support team. The post Organizations Warned of Rise in Okta Support Phishing Attacks appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/organizations-warned-of-rise-in-okta-support-phishing-attacks/

