Closing the ITDR Gap: The Okta Breach Revisited

Thoughts About Application Breach Detection and Response

April 25, 2024
February 26, 2024
February 12, 2024
Revisit what happened at Okta, what the impacts were to both Okta and its customers, and how a more sophisticated approach to identity threat detection may have led to a very different outcome.
February 5, 2024
Notable new developments from Microsoft’s identity breach and five lessons security teams can take from it.
January 25, 2024
Let’s take a closer look at what happened, why it matters, and what lessons the industry can apply in an effort to defend against identity-based threats more effectively.
January 11, 2024
Nicola Sotira, Head of CERT at Poste Italiane, Italy’s largest postal service provider, shares how he built his CERT Big Data Analytics to analyze millions of new logs daily
March 7, 2023
“By thinking in a more sophisticated, analytical way about what constitutes good behavior and anomalous behavior, you get a much higher fidelity of alerts.”
February 7, 2023
“Identity is about establishing trust, while insider risk is what happens when the trust chain is broken. That trust chain might be someone to whom you have willingly given credentials or a trusted employee who has shared credentials or, worse, an impersonator who has stolen credentials.”
February 1, 2023
By deploying user journey analytics, the insurance company would have seen instances of anomalous behavior for the employee crediting $1 to their account.