Featured

Featured
4 minutes

Identifying Client IP Addresses in Okta Audit Logs

Farah Iyer
Apr 4, 2024
Featured
3 minutes

Detecting & Blocking Tycoon’s latest AiTM Phishing Kit

Farah Iyer
Mar 27, 2024
Featured
5 minutes

Risky Business: How HR Tech Can Hurt Identity Security

Farah Iyer
Mar 26, 2024
Featured
3 minutes

SaaS Under Siege: Nation-State Actors Target Identities

Lila Joy Ginsberg
Mar 11, 2024
Featured
5 minutes

Behind The Breach: Microsoft Breach by Russian Hackers

Farah Iyer
Feb 2, 2024
Featured
8 minutes

Behind The Breach: MFA Everywhere, Yes. MFA For Everyone, No.

Farah Iyer
Jan 25, 2024
Featured
5 minutes

Behind the Breach: Pass-The-Cookie Beyond IdPs

Lila Joy Ginsberg
Jan 19, 2024
Featured
2 minutes

Unlock SaaS Security Intelligence with Splunk and Obsidian

Lila Joy Ginsberg
Jan 19, 2024
Featured
5 minutes

Securing Against OAuth Exploitation: A Step-By-Step Guide

Farah Iyer
Dec 19, 2023