Okta Threat Hunting: Auditing Okta Logs Part 2

Update Note Due to the recent events at MGM, which included the compromise of MGM’s Okta tenant, and the surge in attacks of Okta Admins,  we have updated the threat-hunting article, adding a few relevant queries to increase visibility surrounding

Zero Trust Maturity Model: A Definitive Guide

Identity is a topic philosophers have struggled with for years. Identity as a concept spawns many smaller questions, such as “What makes you who you are?”. In the realm of cybersecurity, identity is just as groundbreaking and raises comparable concerns

Defending Azure Active Directory (Entra ID): Unveiling Threats through Hunting Techniques

Azure Active Directory (Entra ID) stands as one of the most popular and widely-used cloud-based identity and access management services provided by Microsoft. It serves as a comprehensive solution for managing user identities and controlling access to a diverse range

The Essential User Access Review Template [Checklist Download]

Imagine having the power to scrutinize user permissions with the finesse of a master locksmith, uncovering hidden backdoors and granting access only to the deserving. Sounds great, right? However, to do that, we need to first start our process with

What is Azure Identity Protection and How to Get the Most out of It

Azure Identity Protection is the enigmatic sentinel of the Microsoft realm. Understanding the inner workings of Azure Identity Security Protection is essential to any information security officer, and will unlock the keys to an effective user risk policy. Unsurprisingly, cyber

10 IAM Best Practices for 2023

Most enterprises recognize IAM strategies as an effective way to mitigate security challenges, but turning intention into action is another story. Why do some businesses still allow their employees to use ‘12345’ as a password despite knowing the financial and

Rezonate Announces Mid-Market Identity-Security Solution. Learn more