Security Guidance

Security Guidance
4 minutes

Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

Farah Iyer
Apr 17, 2024
Security Guidance
4 minutes

How to Correctly Use Client IP Addresses in Okta Audit Logs to Improve Identity Security 

Farah Iyer
Apr 4, 2024
Security Guidance
3 minutes

Detecting & Blocking Tycoon’s latest AiTM Phishing Kit

Farah Iyer
Mar 27, 2024
Security Guidance
5 minutes

Risky Business: How HR Tech is Contributing to Identity Risks

Farah Iyer
Mar 26, 2024
Security Guidance
4 minutes

SaaS Under Siege: Nation-State Actors Target Identities

Lila Joy Ginsberg
Mar 11, 2024
Security Guidance
5 minutes

Behind The Breach: Microsoft Breach by Russian Hackers

Farah Iyer
Feb 2, 2024
Security Guidance
7 minutes

Behind The Breach: MFA Everywhere, Yes. MFA For Everyone, No.

Farah Iyer
Jan 25, 2024
Security Guidance
5 minutes

Behind the Breach: Pass-The-Cookie Beyond IdPs

Lila Joy Ginsberg
Jan 19, 2024
Security Guidance
5 minutes

Securing Against OAuth Exploitation: A Step-By-Step Guide

Farah Iyer
Dec 19, 2023