Security Guidance

Security Guidance
4 minutes

Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

Farah Iyer
Apr 17, 2024
Security Guidance
4 minutes

Identifying Client IP Addresses in Okta Audit Logs

Farah Iyer
Apr 4, 2024
Security Guidance
3 minutes

Detecting & Blocking Tycoon’s latest AiTM Phishing Kit

Farah Iyer
Mar 27, 2024
Security Guidance
5 minutes

Risky Business: How HR Tech Can Hurt Identity Security

Farah Iyer
Mar 26, 2024
Security Guidance
3 minutes

SaaS Under Siege: Nation-State Actors Target Identities

Lila Joy Ginsberg
Mar 11, 2024
Security Guidance
5 minutes

Behind The Breach: Microsoft Breach by Russian Hackers

Farah Iyer
Feb 2, 2024
Security Guidance
8 minutes

Behind The Breach: MFA Everywhere, Yes. MFA For Everyone, No.

Farah Iyer
Jan 25, 2024
Security Guidance
5 minutes

Behind the Breach: Pass-The-Cookie Beyond IdPs

Lila Joy Ginsberg
Jan 19, 2024
Security Guidance
5 minutes

Securing Against OAuth Exploitation: A Step-By-Step Guide

Farah Iyer
Dec 19, 2023