Assessing the Attack on Okta’s Support Unit Mitigate Your Risk with Six Steps and New CyberArk HAR Tool

November 21, 2023

Okta's support case management system was breached by a threat actor using stolen credentials. Watch as CyberArk resident experts, Khizar Sultan and Andy Thompson, deconstruct the events of this breach and share strategies organizations can take to mitigate the risks of identity attacks using strong security processes and operational procedures.

Previous Article
Empowering Today's Workforce with a Security-first Strategy
Empowering Today's Workforce with a Security-first Strategy

Learn how intelligent privilege controls can help secure workforce access in complex IT environments where ...

Next Video
Fireside chat: Trends Driving an Identity Security Approach
Fireside chat: Trends Driving an Identity Security Approach

CyberArk’s CIO and SVP of Identity Security offer perspective on trends and how transformational organizati...