Click any tag below to further narrow down your results
Links
The author reports a security vulnerability in Okta's nextjs-auth0 project and submits a patch, but the contribution is misattributed to another developer. Despite raising concerns, the maintainer acknowledges using AI for the commit, resulting in confusion and unresolved issues around proper credit. The author questions the reliability of AI tools and raises concerns about Okta's response to security vulnerabilities.
This article covers how to manage non-human identities (NHIs) using Okta's Identity Security Posture Management (ISPM). It highlights real-time detection of NHI risks, strategies for securing autonomous agents, and a roadmap for rapid deployment. The focus is on practical techniques and visualization tools to enhance security.
The Okta Security Detection Catalog is a comprehensive repository of detection rules and log field descriptions aimed at enhancing security monitoring for Okta customers. It includes YAML files for security detections, threat hunting queries, and templates for incident response workflows. The catalog emphasizes the importance of using the System Log for tracking events and recommends strategies for optimizing detection effectiveness.
Okta has open-sourced a series of Sigma-based queries for Auth0 users to enhance their ability to detect account takeovers and suspicious activities in event logs. The Customer Detection Catalog allows security teams to integrate these pre-built detection rules into their monitoring systems, improving threat detection capabilities while encouraging community contributions for ongoing development.