Robuta

https://www.okta.com/video/oktane18-protect-against-breaches-identity-centric-security/
In this Oktane18 session, hear why CISOs and and security organizations should take an identity centric approach to security.
identitycentricsecurityokta
https://www.okta.com/en-sg/identity-101/cissp/
The Certified Information Systems Security Professional (CISSP) training transforms IT and business professionals into cybersecurity experts.
information systems securitycisspcertifiedprofessionalokta
https://www.okta.com/au/cloud-access-security-brokers/
Okta with Cloud Access Security Brokers provides a policy-based, automated approach to securing and protecting data and apps in the cloud.
cloud access securitybrokersoktaaustralia
https://www.okta.com/resources/whitepaper-leverage-identity-first-security-to-ensure-the-right-access-is-given-at-the/
leverageidentityfirstsecurityensure
https://www.okta.com/fr-fr/newsroom/articles/okta-coo-highlights-ai-agent-security-gap-on-big-technology-podcast/
AI agent adoption is outpacing governance, creating massive risk. Eric Kelleher explores this governance gap and more on the Big Technology podcast.
ai agent securityoktacoohighlightsgap
https://www.okta.com/en-sg/blog/product-innovation/boosting-security-with-okta-identity-threat-protection-and-workflows/
identity threat protectionboostingsecurityoktaworkflows
https://www.helpnetsecurity.com/2018/08/23/exabeam-okta-partnership/
The joint Exabeam and Okta solution will help security teams to monitor and protect enterprises against credential-based threats.
security detectionexabeamoktapartnerdeliver
https://www.okta.com/en-nl/blog/identity-security/identity-security-posture-management-a-new-sheriff-in-town/
Identity is the new perimeter of your organization and has become a focus point for its cybersecurity threats. Learn how Okta Identity Security Posture...
identity security postureoktamanagementprotectsperimeter
https://www.okta.com/au/network-security/
Okta network security solutions provide a unified security infrastructure that allows for a seamless experience for users and admins.
network securityoktaaustralia
https://www.okta.com/blog/ai/ai-agent-authorization-gap/
AI agents in shared workspaces expose sensitive data due to an authorization gap. Learn how fine-grained authorization can fix this by scoping permissions...
ai agent securityshared workspacesauthorizationgapokta
https://www.okta.com/blog/ai/ai-agent-security-series/
AI agents require a new security model. Okta shows how to rebuild IAM for autonomy, enabling real-time authorization to secure non-human identities at machine...
ai agent securityseriesrebuildingiamautonomous
https://www.okta.com/identity-101/privacy-vs-security/
Privacy and security are similar but different security subcategories that must be protected. Explore the difference between privacy and security with Okta.
privacyvssecurityexploringdifferences
https://www.okta.com/en-gb/products/login-security/
Login securely with Okta Customer Identity Cloud, powered by Auth0 and discover how strong security and a hassle-free customer experience go hand in hand.
login securityokta
https://www.okta.com/en-sg/identity-101/privacy-vs-security/
Privacy and security are similar but different security subcategories that must be protected. Explore the difference between privacy and security with Okta.
privacyvssecurityexploringdifferences
https://www.okta.com/ko-kr/identity-101/multi-tenancy-cloud/
A multi-tenant cloud allows users to share computing resources while keeping personal data separated. Decipher multi-tenant cloud architecture with Okta.
multi tenancysecurity benefitsclouddefinitionokta
https://www.okta.com/integrations/whitehat-security-saml/
Easily connect Okta with Whitehat Security SAML or use any of our other 7,000+ pre-built integrations.
whitehatsecuritysamlokta
https://www.okta.com/en-gb/blog/identity-security/3-ways-okta-can-help-you-improve-your-security-posture-and-respect-privacy-forward/
Identity is the primary enterprise security entry point for all workforce and consumer applications. Securing digital identities can enable respect for human...
security postureimproverespectprivacyforward
https://www.okta.com/en-se/blog/identity-security/secure-saas-spotlight-oin/
Discover Okta's newest enterprise-ready apps in the OIN. Features like Express Configuration and Universal Logout enable faster, more secure deployment and...
new enterprisesaas securityoktaoinidentity
https://www.okta.com/en-au/blog/industry-insights/key-insights-cso-identity-security-survey/
Discover key takeaways from Okta's survey of 200 CSOs on identity security trends, ransomware, and new opportunities for the Okta Ventures portfolio.
survey insightsidentity securitycsotrendsokta
https://www.okta.com/es-es/newsroom/articles/okta-cso-david-bradbury-on-the-ai-race-and-the-price-of-security/
Okta CSO David Bradbury discusses securing the AI-driven enterprise. Learn why identity management for autonomous AI agents is critical and how to avoid costly...
david bradburyai raceoktacso
https://thehackernews.com/2022/04/okta-says-security-breach-by-lapsus.html
Okta said it concluded its investigation into the breach of a third-party vendor by the LAPSUS$ extortionist gang in late January 2022.
security breachoktasayslapsushackers
https://www.okta.com/en-sg/blog/identity-security/3-ways-okta-can-help-you-improve-your-security-posture-and-respect-privacy-forward/
Identity is the primary enterprise security entry point for all workforce and consumer applications. Securing digital identities can enable respect for human...
security postureimproverespectprivacyforward
https://www.okta.com/blog/identity-security/secure-saas-spotlight-oin/
Discover Okta's newest enterprise-ready apps in the OIN. Features like Express Configuration and Universal Logout enable faster, more secure deployment and...
new enterprisesaas securityoktaoinidentity
https://www.okta.com/resources/webinar-oktane-redefining-security-box/
Watch this webinar to learn how modern enterprises can utilize new technology solutions to secure their data and increase productivity.
cloud collaborationredefiningsecuritynewrole
https://www.okta.com/en-au/blog/product-innovation/implementing-security-best-practices-in-okta-developer-orgs/
Explore Okta's journey in enhancing the security of the Developer Edition Service. Learn about the service's features and the implemented security measures.
security best practicesimplementingoktadeveloperorgs
https://www.okta.com/en-sg/newsroom/articles/how-okta-fosters-a-security-culture/
What does it take to make security intrinsic to your organization? Learn from Okta's Sr. Director of Security and Culture on our approach to security.
security cultureoktafosters
https://www.okta.com/integrations/symantec-web-security-service/
Easily connect Okta with Symantec Web Security Service or use any of our other 7,000+ pre-built integrations.
web securitysymantecserviceokta
https://www.okta.com/en-nl/identity-101/ciso/
A CISO, or chief information security officer, is the highest ranking security specialist in an organization. Learn more about the role and its duties here.
information security officercisochiefokta
https://www.okta.com/de-de/identity-101/cloud-computing-security/
cloud computing securityihrleitfadenokta
https://www.securitymagazine.com/articles/97302-cybersecurity-firm-okta-investigating-possible-data-breach
Identity and access management company Okta is investigating a possible data breach after ransomware group Lapsus$ claimed to have hacked the company.
data breachsecurity magazinecybersecurityfirmokta
https://security.okta.com/
SafeBase monitors your security practices to enable you to win enterprise deals.
security trust centeroktapowered
https://bookmarklinking.com/story5313786/enhance-your-microsoft-365-security-with-okta-login
okta loginenhancemicrosoftsecurity
https://www.okta.com/en-se/identity-101/security-through-obscurity/
Security through obscurity relies on secrecy to enhance cyber defense. Learn why many security admins find security by obscurity to be ineffective with Okta.
securityobscuritystocriticismrisks
https://www.okta.com/sg/video/oktane18-protect-against-breaches-security-roadmap/
Hear about all the advancement in Okta's security products and integrations and what's to come in the next 12 months.
okta securityroadmapsingapore
https://www.okta.com/infographic/adaptive-multi-factor-authentication-vs-the-rest/
Not all two-factor or multi-factor authentication (MFA) solutions are created equally. Levels of security vary based on the type of factors used, and l...
multi factor authenticationvs basicsecurity policiesadaptiveokta
https://www.okta.com/en-gb/blog/identity-security/okta-ispm-now-supports-active-directory/
Secure your on-premises Active Directory with Okta Identity Security Posture Management (ISPM). Get deep security insights and unified visibility across your...
identity security postureactive directoryoktamanagementsupports
https://www.okta.com/ko-kr/identity-101/zero-trust-framework-a-comprehensive-modern-security-model/
Discover how a Zero Trust Framework can revolutionize security. Protect your network and assets with advanced verification for all users and devices.
zero trustframeworkidentitypoweredmodern
https://www.okta.com/video/meet-your-okta-security-expert-brent-arrington/
In this podcast, Okta experts discuss how they help improve their customers' security posture.
okta securitymeetexpertbrentarrington
https://www.okta.com/en-se/newsroom/articles/okta-ceo-at-dreamforce-simplicity-is-key-for-ai-security/
Okta CEO Todd McKinnon discusses AI security at Dreamforce, emphasizing that simplicity and a unified identity security fabric are key to managing risk.
ai securityoktaceodreamforcesimplicity
https://www.okta.com/en-ca/identity-101/ciso/
A CISO, or chief information security officer, is the highest ranking security specialist in an organization. Learn more about the role and its duties here.
information security officercisochiefokta
https://www.okta.com/en-au/blog/identity-security/3-mfa-myths-holding-you-back/
Explore the 3 biggest myths about Multi-Factor Authentication (MFA) that are leaving your organization vulnerable. Learn the truth and strengthen your security...
multi factor authenticationholding backmythssecurityokta
https://www.okta.com/blog/industry-insights/back-to-school-navigating-the-rising-identity-security-challenges-in-higher-education/
With millions of students heading back to school, colleges and universities are grappling with offering seamless and secure technology solutions in an...
identity securityhigher educationnavigatingrisingchallenges
https://www.okta.com/en-se/identity-101/privacy-vs-security/
Privacy and security are similar but different security subcategories that must be protected. Explore the difference between privacy and security with Okta.
privacyvssecurityexploringdifferences
https://www.okta.com/de-de/identity-101/security-hacker/
Sicherheitshacker arbeiten daran, Schwachstellen in Computerabwehrsystemen auszunutzen. Entdecken Sie hier die Geschichte, Motivationen und Methoden des...
security hackergeschichtetypenexploitsund
https://www.okta.com/en-sg/identity-101/remote-desktop-services/
remote desktop servicesrds securitybenefitsusesokta
https://www.okta.com/en-se/newsroom/press-releases/okta-unveils-new-okta-workforce-identity-cloud-innovations-to-power/
Okta, Inc. the leading independent identity provider, today at Oktane22, introduced new innovations for Okta Workforce Identity Cloud
workforce identityoktaunveilsnewcloud
https://www.f5.com/company/blog/okta-f5-nginx-shape
At its annual identity conference, Oktane21, technology leader Okta highlights exciting news about its partnership with F5: new features and capabilities that...
distributed cloud servicesenhanced securityoktashowcasescapabilities
https://www.okta.com/en-sg/blog/product-innovation/automating-security-operations-with-okta-workflows/
Simplify identity automation with Okta Workflows Solution Packs- pre-built, customizable templates categorized by business, vertical, and use case.
security operationsautomatingoktaworkflows
https://www.okta.com/de-de/reports/state-of-zero-trust/
zero trust securitystateokta
https://www.okta.com/en-sg/webinars/hub/automate-critical-it-and-security-tasks-scale-okta-workflows/
Join this webinar where we will introduce the most popular use cases you can implement with pre-built templates
automatecriticalsecuritytasksscale
https://www.okta.com/blog/product-innovation/ciam-by-example-four-recipes-to-improve-security-and-ux/
Check out the intro post to our series on how Customer Identity and Access Management (CIAM) can improve the security and user experience of your applications.
customer identityimprovingsecurityuxokta
https://incode.com/blog/introducing-the-incode-okta-workforce-identity-integration-a-new-standard-for-workforce-security/
Nov 19, 2025 - Discover the new Incode + Okta Workforce Identity integration that sets a new standard for workplace security. Advanced biometric verification analyzes 80+...
okta workforce identitynew standardintroducingintegration
https://www.okta.com/en-au/blog/identity-security/secure-saas-spotlight-oin/
Discover Okta's newest enterprise-ready apps in the OIN. Features like Express Configuration and Universal Logout enable faster, more secure deployment and...
new enterprisesaas securityoktaoinidentity
https://www.okta.com/de-de/company/leadership/david-bradbury/
chief security officerdavid bradburyokta
https://www.okta.com/en-gb/products/identity-security-posture-management/
Observe, understand, prioritize, and remediate Identity threats and vulnerabilities using Okta's comprehensive Identity Security Posture Management solution.
identity security posturemanagementokta
https://www.okta.com/en-gb/blog/identity-security/okta-verify-same-device-enrollment/
Simplify your Okta Verify setup. Same Device Enrollment is a new, phishing-resistant, OIDC-based flow that replaces insecure QR, SMS, and email methods.
device enrollmentenhanced securityoktaverify
https://www.okta.com/ko-kr/webinars/hub/automate-critical-it-and-security-tasks-scale-okta-workflows/
Join this webinar where we will introduce the most popular use cases you can implement with pre-built templates
automatecriticalsecuritytasksscale
https://www.okta.com/blog/identity-security/okta-verify-same-device-enrollment/
Simplify your Okta Verify setup. Same Device Enrollment is a new, phishing-resistant, OIDC-based flow that replaces insecure QR, SMS, and email methods.
device enrollmentenhanced securityoktaverify
https://www.okta.com/ko-kr/newsroom/press-releases/okta-unveils-new-okta-workforce-identity-cloud-innovations-to-power/
Okta, Inc. the leading independent identity provider, today at Oktane22, introduced new innovations for Okta Workforce Identity Cloud
workforce identityoktaunveilsnewcloud
https://www.okta.com/ko-kr/blog/industry-insights/how-modern-identity-strategies-shape-enterprise-security/
In this blog, we explore the core principles of a modern identity strategy, how it helps close visibility gaps and reduce risk, and why leading teams are...
enterprise securitymodernidentitystrategiesshape
https://www.okta.com/en-se/reports/state-of-zero-trust/
zero trust securitystateokta
https://www.okta.com/infographic/balancing-security-and-employee-experience-during-the-crisis/
Okta and Pulse surveyed 200 IT executives to uncover how leaders are simultaneously boosting security and enhancing employee efficiency and morale while...
employee experiencebalancingsecuritycrisisokta
https://www.biometricupdate.com/202504/cyberark-okta-google-target-ai-agent-security
By 2028 a quarter of enterprise breaches will be related to AI agent abuse, according to analysis by research firm Gartner.
ai agent securitycyberarkoktagoogletarget
https://www.okta.com/es-es/newsroom/articles/oktas-q1-fy26-earnings-recap-in-identity-security-innovation-drives-growth/
identity securityoktaearningsrecapinnovation
https://www.okta.com/en-nl/company/leadership/david-bradbury/
chief security officerdavid bradburyokta
https://www.okta.com/en-gb/blog/industry-insights/key-insights-cso-identity-security-survey/
Discover key takeaways from Okta's survey of 200 CSOs on identity security trends, ransomware, and new opportunities for the Okta Ventures portfolio.
survey insightsidentity securitycsotrendsokta
https://www.okta.com/en-ca/blog/company-and-culture/founders-in-focus-emanuel-salmona-of-nagomi-security/
Emanuel Salmona of Nagomi Security speaks to Austin Arensbeg about his company's products, teaming up with Okta, the future of security, AI, and more.
foundersfocusemanuelnagomisecurity
https://www.okta.com/blog/industry-insights/okta-ventures-predictions-2026/
Discover Okta Ventures' 2026 predictions for the future of enterprise technology. Insights from portfolio founders on AI agents, identity security, and...
okta venturestop aisecurityampidentity
https://www.okta.com/integrations/astrix-security-monitoring/
Easily connect Okta with Astrix Security Monitoring or use any of our other 7,000+ pre-built integrations.
security monitoringastrixokta
https://www.okta.com/fr-fr/newsroom/press-releases/new-okta-innovations-secure-the-ai-driven-enterprise-and-combat-/
newoktainnovationssecureai
https://www.okta.com/en-sg/newsroom/press-releases/new-okta-innovations-secure-the-ai-driven-enterprise-and-combat-/
newoktainnovationssecureai
https://www.okta.com/en-se/newsroom/articles/okta-cso-david-bradbury-on-the-ai-race-and-the-price-of-security/
Okta CSO David Bradbury discusses securing the AI-driven enterprise. Learn why identity management for autonomous AI agents is critical and how to avoid costly...
david bradburyai raceoktacso
https://www.okta.com/en-sg/solutions/saas-security/
Land more enterprise deals, accelerate time to value, and deliver best-in-class security to your customers. Discover the countless reasons to partner with Okta.
identity securityacceleratesaasokta
https://www.okta.com/en-se/identity-101/biometrics-secure-authentication/
Biometric Authentication is Shaping the Future of Secure Access. Learn how Biometrics can Safeguard Identity as part of a rock-solid MFA Strategy.
biometric authenticationadvanced securitysolutionsokta
https://www.okta.com/blog/product-innovation/enhanced-security-and-phishing-resistance-for-unmanaged-ios-devices-with-okta-fastpass/
Building upon its foundation of comprehensive phishing resistance across all managed devices and most unmanaged devices, including Android, MacOS, and Windows,...
enhanced securityphishing resistanceios devicesunmanaged
https://bitwarden.com/resources/bitwarden-okta-enhance-security-with-plug-and-play-integration/
Bitwarden and Okta together deliver a comprehensive identity access management (IAM) and single sign-on (SSO) solution for centralized SaaS applications and...
enhance securityplug playbitwardenoktaintegration
https://www.okta.com/en-sg/identity-101/biometric-data/
Biometric data is becoming more prevalent in cyber security, but what is biometric data and how do you keep this information safe? Learn more here.
biometric datasecurity concernsdefinitionokta
https://www.okta.com/en-nl/blog/customers-and-partners/the-challenges-of-managing-digital-identity-in-the-not-for-profit-sector/
Nonprofits face complex user management, rising compliance, and cyber threats like phishing. Discover how a modern Identity solution from Okta can simplify...
identity managementmodernsolvingprofitsecurity
https://www.okta.com/en-ca/blog/industry-insights/smbs-at-work-2024-how-are-smbs-implementing-security-we-have-answers/
Are SMBs investing in security? Read our blog to learn why and how SMBs are implementing security to keep their businesses compliant and secure.
smbsimplementingsecurityokta
https://www.okta.com/ko-kr/blog/industry-insights/key-insights-cso-identity-security-survey/
Discover key takeaways from Okta's survey of 200 CSOs on identity security trends, ransomware, and new opportunities for the Okta Ventures portfolio.
survey insightsidentity securitycsotrendsokta
https://investorplace.com/2023/10/okta-stock-continues-to-fall-following-security-breach/?utm_source=financialcontent&utm_medium=quotes
Okta stock is still falling on Monday as the company's shares suffer after it revealed a data breach of customer information.
security breachoktastockcontinuesfall
https://www.okta.com/en-ca/blog/identity-security/
Implementing an identity security fabric is the first step to meeting organizational goals and customer expectations.
identity securityblogokta
https://www.okta.com/en-se/blog/industry-insights/back-to-school-navigating-the-rising-identity-security-challenges-in-higher-education/
With millions of students heading back to school, colleges and universities are grappling with offering seamless and secure technology solutions in an...
identity securityhigher educationnavigatingrisingchallenges
https://www.darktrace.com/news/darktrace-integrates-with-zscaler-okta-duo-security-to-enhance-zero-trust-with-its-detection-autonomous-response-capabilities
duo securitydarktraceintegrateszscalerokta
https://www.okta.com/resources/whitepaper/security-built-to-work-outside-the-perimeter/
We breakdown the acronyms, pros, and cons of 2-Factor Authentication (2FA), Multi-Factor Authentication (MFA), and Adaptive Multi-Factor Authentication (AMFA).
securitybuiltworkoutsideperimeter
https://www.okta.com/en-gb/blog/identity-security/three-ways-customer-identity-supports-data-compliance-and-security/
Learn how Okta can help you balance regulatory requirements for data and security with customer expectations for control over how you use their data.
customer identitydata compliancesupportssecurityokta
https://www.okta.com/ko-kr/identity-101/security-hacker/
Security hackers work to exploit vulnerabilities in computer defense systems. Discover the history, motivations and methodologies of security hacking here.
security hackerhistorytypesexploitsbenefits
https://www.okta.com/webinars/hub/strengthen-your-security-posture-with-okta-identity-governance-and-privileged-access/
Transform your identity governance and privileged access strategy
security postureidentity governancestrengthenoktaprivileged
https://www.okta.com/pt-br/newsroom/press-releases/okta-and-palo-alto-networks-unify-ai-driven-security-to-fight-id/
The expanded partnership introduces new integrations for a unified security architecture, including automated threat response, secure app access on any device,...
palo alto networksoktaunifyaidriven
https://www.okta.com/en-nl/identity-101/context-based-authentication/
next leveltakesecuritycontextbased
https://www.okta.com/en-ca/blog/identity-security/3-mfa-myths-holding-you-back/
Explore the 3 biggest myths about Multi-Factor Authentication (MFA) that are leaving your organization vulnerable. Learn the truth and strengthen your security...
multi factor authenticationholding backmythssecurityokta
https://www.okta.com/en-se/webinars/hub/secure-your-security-posture-with-okta-identity-governance-and-privileged-access/
See how Okta Identity Governance (OIG) and Okta Privileged Access (OPA) work in tandem to reduce risk, enforce least privilege, and strengthen your...
security postureidentity governancestrengthenoktaprivileged
https://www.okta.com/en-au/blog/identity-security/future-ready-workforce-protection-the-case-for-identity-powered-security-in-financial/
Identity-powered security can lay the foundation for a strong security posture, better workforce UX, and higher productivity.
financial servicesidentitypoweredsecurityokta
https://www.okta.com/pt-br/blog/ai/ai-security-agent-cross-system-trust/
AI agents routinely cross independent security domains, leaving no shared defense when tokens are compromised. Learn how the Salesloft Drift breach exposed the...
ai securityagentcrossesmultipleindependent
https://www.okta.com/webinars/hub/beyond-oktane-how-to-manage-nhi-with-okta-ispm/
Attend our Nov 5th webinar to see how Okta ISPM detects and manages Non-Human Identities (NHI), including AI agents, mapped to the OWASP NHI Top 10. Get your...
non humanbeyondmanageidentitiesokta
https://www.okta.com/integrations/tenable-cloud-security/
Easily connect Okta with Tenable Cloud Security or use any of our other 7,000+ pre-built integrations.
tenable cloud securityokta
https://www.okta.com/en-se/identity-101/biometric-passport/
A biometric passport is much like a standard passport with enhanced computer chip stored security. Learn the benefits and future of the e-passport with Okta.
biometric passportsecurity dataprotectionworkokta
https://www.okta.com/ko-kr/blog/product-innovation/ciam-by-example-four-recipes-to-improve-security-and-ux/
Check out the intro post to our series on how Customer Identity and Access Management (CIAM) can improve the security and user experience of your applications.
customer identityimprovingsecurityuxokta