What you need to know about Okta’s security breach
CIO
OCTOBER 25, 2023
Traditional security controls are bypassed in such attacks as bad actors assume a user’s identity and their malicious activity is indistinguishable from routine behavior. Deception Adversaries rely on human error, policy gaps, and poor security hygiene to circumvent defenses and stay hidden as they escalate privileges and move laterally.
Let's personalize your content