×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Assessing the Attack on Okta’s Support Unit Mitigate Your Risk with Six Steps and New CyberArk HAR Tool

November 21, 2023

Okta's support case management system was breached by a threat actor using stolen credentials. Watch as CyberArk resident experts, Khizar Sultan and Andy Thompson, deconstruct the events of this breach and share strategies organizations can take to mitigate the risks of identity attacks using strong security processes and operational procedures.

Previous Article
Dynamic Privileged Access – Sydney Data Center, Improved RDP and SSH Connections
Dynamic Privileged Access – Sydney Data Center, Improved RDP and SSH Connections

CyberArk DPA adds Sydney data center, offering improved RDP connections with robust account policies, simpl...

Next Video
Going Passwordless for Enterprises Key Considerations for Success
Going Passwordless for Enterprises Key Considerations for Success

Learn key considerations for success in implementing passwordless authentication for enterprises.