Okta Threat Intelligence

How AI services power the DPRK’s IT contracting scams

Nobody does GenAI quite like a fake IT worker.
Zach Newton

Detect and Prevent Cross Device Authentication

Trusted App Filters accounts for Identity-based attacks arising from compromised hardware. This blog article provides insights and resources on preventing and detecting Cross Device Authentication (CDA) authentication attacks.
Carmen Girardin

How Responsible Disclosures are Shaping a Safer Cyberspace

What was once considered a controversial topic has gained widespread appeal as a crucial practice in the ongoing fight against threat actors and vulnerability exploitation. Ethical hackers and security researchers are revolutionizing today’s vulnerability management programs and reducing online risks by participating in Bug Bounty programs and disclosing vulnerabilities responsibly.
Carmen Girardin and Caroline von Konigsmark

Cybersecurity’s Next Gen

Cyber safety begins with healthy cybersecurity habits. Early adoption of good habits can protect our youth from online threats like cyberbullying, exposure to inappropriate content, and identity theft. This blog article introduces Okta's Cyber Kidz program, which was launched earlier this year in Sydney, Australia. Okta’s commitment to security from the ground up is demonstrated by empowering the next generation with essential cybersecurity skills.
Okta

Next.js CVE-2025-29927

On March 21, 2025, Vercel disclosed a critical security vulnerability (CVE-2025-29927) which makes it possible to bypass authorization checks within a Next.js application if the authorization check occurs in middleware. Note: The Okta service is not affected by this vulnerability.
Matthew Hansen

CSO Conversations: Matthew Hansen, Regional CSO of Americas West

CSO Conversations is a blog series interviewing Okta’s Regional CSOs supporting David Bradbury, Okta’s Chief Security Officer in providing the best service for our customers. Okta’s Regional CSOs are integral to Okta’s Security Trust and Culture team, building and strengthening trusted advisor relationships with global security thought leadership.
Tushar Badlani and Lydia Le

Empowering Security with Customer Trust Solutions

This is the second blog publication in our series on Security Customer Trust. In our first blog, we explored how Okta’s Security Customer Trust team proactively maintains transparency and introduced our mission: to bolster security outcomes for Okta and the communities we serve. In this blog, we’ll touch on how we’ve introduced efficiencies in supporting these challenges through enablement, automation and self-service accesses.
Carmen Girardin

Putting Security First with Secure Development

At Okta, prioritizing security at the earliest stages of technology development and throughout the Software Development Lifecycle (SDLC) is of utmost importance. This blog article introduces our new Secure Development Lifecycle (SDL) whitepaper and highlights the importance of secure development practices throughout the technology lifecycle.
Dan Dennhardt and Vadim Spector and John Murphy and Dinko Bajric

One trick finds the root of any Okta troubles

Use these two System Log queries to see every event during a given user session, or every event that used a given API token.
Stephen McDermid

CSO Conversations: Stephen McDermid, Regional CSO of EMEA

CSO Conversations is a blog series interviewing Okta’s Regional CSOs supporting David Bradbury, Okta’s Chief Security Officer in providing the best service for our customers. Okta’s Regional CSOs are integral to Okta’s Security Trust and Culture team, building and strengthening trusted advisor relationships with global security thought leadership.
Page 1 of 13