Okta unveils identity capabilities to better secure the digital workspace
Okta released two new promotional offers that allow VMware Workspace ONE customers to take advantage of the Okta Identity Cloud through their local channel partner. These two …

Countering threats: Steps to take when developing APIs
High profile data breaches resulting from faulty APIs continue to make headlines. In the last few months alone, T-Mobile’s data breach resulted in hackers stealing personal …
Lookout puts the trust in zero trust with new post-perimeter security solutions
Lookout’s new approach to cybersecurity is designed to protect businesses as their employees work from outside the corporate perimeter. With integrations to Okta, VMware …
Exabeam and Okta partner to deliver security detection and response for identity
Exabeam and Okta have partnered to deliver an identity security solution that enables organizations to detect, investigate and respond to credential-based attacks in real …

Microsoft ADFS flaw allows attackers to bypass MFA safeguards
A vulnerability (CVE-2018-8340) in Microsoft Active Directory Federation Services (ADFS) allows a second authentication factor for one account to be used for all other …
Okta acquires ScaleFT to bring Zero Trust to the enterprise
Okta announced it has acquired ScaleFT. Together, Okta and ScaleFT will bring Zero Trust to the enterprise by providing organizations with a framework to protect data, without …

Fooling security tools into believing malicious code was signed by Apple
The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security …

Security in the enterprise: Things are looking up!
Cybersecurity is quickly becoming the number one business priority, says identity and access management company Okta. Based on the results of an analysis of authentication and …
Featured news
Resources
Don't miss
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028