# Blogs

- [0ktapus for humans](/blogs/0ktapus-for-humans.md): Sep 13, 2022
- [Oort Releases GitHub Integration To Extend Identity Threat Detection](/blogs/oort-releases-github-integration-to-extend-identity-threat-detection.md)
- [Oort Recognized Twice as a Sample Vendor in Gartner® 2023 Hype Cycle Reports™](/blogs/oort-recognized-twice-as-a-sample-vendor-in-gartner-r-2023-hype-cycle-reports-tm.md)
- [Oort's Response Capabilities: Remediate Compromised Accounts with Just One Click](/blogs/oorts-response-capabilities-remediate-compromised-accounts-with-just-one-click.md)
- [Oort Unveils Dashboard, Providing A Single Pane of Glass for Identities](/blogs/oort-unveils-dashboard-providing-a-single-pane-of-glass-for-identities.md)
- [Oort’s New Identity Security Dashboard](/blogs/oorts-new-identity-security-dashboard.md)
- [Oort Unveils Identity Technology Ecosystem, Bringing Identity Data out of Orbit and Into View](/blogs/oort-unveils-identity-technology-ecosystem-bringing-identity-data-out-of-orbit-and-into-view.md)
- [Oort: Your Security Layer On Top Of Okta](/blogs/oort-your-security-layer-on-top-of-okta.md)
- [Populating the Unpopulated: Challenges of Building a Comprehensive User Inventory](/blogs/populating-the-unpopulated-challenges-of-building-a-comprehensive-user-inventory.md)
- [Protecting IT Help Desk Teams Against Cyber Attacks](/blogs/protecting-it-help-desk-teams-against-cyber-attacks.md)
- [Protecting Salesforce Accounts from Takeovers and Ungoverned Access](/blogs/protecting-salesforce-accounts-from-takeovers-and-ungoverned-access.md)
- [Restrict Guest Access Permissions: Best Practices and Challenges](/blogs/restrict-guest-access-permissions-best-practices-and-challenges.md)
- [Seizing the Communication Opportunity: Aligning Perspectives in Identity Security](/blogs/seizing-the-communication-opportunity-aligning-perspectives-in-identity-security.md)
- [Session Hijacking in a Post-Genesis World](/blogs/session-hijacking-in-a-post-genesis-world.md)
- [SIEM vs. Security Data Lake: Why it's Time to Rethink Your Security Program](/blogs/siem-vs.-security-data-lake-why-its-time-to-rethink-your-security-program.md)
- [Speaking the Same Language for Identity Security: Identify, Protect, Detect, Respond](/blogs/speaking-the-same-language-for-identity-security-identify-protect-detect-respond.md)
- [State of Identity Security research reveals 40% of accounts use weak or no form of multi-factor authentication to protect identities](/blogs/state-of-identity-security-research-reveals-40-of-accounts-use-weak-or-no-form-of-multi-factor-authe.md)
- [Strengthening Identity Controls: Mapping to CIS CSC and NIST CSF Security Frameworks](/blogs/strengthening-identity-controls-mapping-to-cis-csc-and-nist-csf-security-frameworks.md)
- [Strengthening Identity Security with Single Sign-On (SSO) Systems](/blogs/strengthening-identity-security-with-single-sign-on-sso-systems.md)
- [Succeeding with Proper Detection for Identity Security: A Comprehensive Approach](/blogs/succeeding-with-proper-detection-for-identity-security-a-comprehensive-approach.md)
- [Taking a Data-Driven Approach to Identity Security](/blogs/taking-a-data-driven-approach-to-identity-security.md)
- [The Concerning Prevalence of Weak Second Factors](/blogs/the-concerning-prevalence-of-weak-second-factors.md)
- [The Crucial Role of an Identity Security Leader](/blogs/the-crucial-role-of-an-identity-security-leader.md)
- [Why I am Joining Oort](/blogs/why-i-am-joining-oort.md)
- [The Quest for a Passwordless World](/blogs/the-quest-for-a-passwordless-world.md)
- [Understanding Azure Active Directory (Azure AD)](/blogs/understanding-azure-active-directory-azure-ad.md)
- [Understanding the Implications of New SEC Rules on Cyber Incident Disclosure](/blogs/understanding-the-implications-of-new-sec-rules-on-cyber-incident-disclosure.md)
- [Unlocking the Power of Zero Trust: The Crucial Role of Identity and Oort's Identity Security Platform](/blogs/unlocking-the-power-of-zero-trust-the-crucial-role-of-identity-and-oorts-identity-security-platform.md)
- [Respond Even Quicker to Identity Threats](/blogs/respond-even-quicker-to-identity-threats.md)
- [What to Look Out For at Gartner IAM](/blogs/what-to-look-out-for-at-gartner-iam.md)
- [7 Critical Requirements for Securing Third-Party and Vendor Access](/blogs/7-critical-requirements-for-securing-third-party-and-vendor-access.md)
- [Best Practices for Efficiently Responding to Identity Threats](/blogs/best-practices-for-efficiently-responding-to-identity-threats.md)
- [Announcing our Identity Technology Partner Ecosystem](/blogs/announcing-our-identity-technology-partner-ecosystem.md)
- [Catching waves and building clouds](/blogs/catching-waves-and-building-clouds.md)
- [Cisco Announces Intent to Acquire Oort](/blogs/cisco-announces-intent-to-acquire-oort.md)
- [CISO Perspectives: Eric Richard, HubSpot](/blogs/ciso-perspectives-eric-richard-hubspot.md)
- [Defining Roles & Responsibilities for an Identity Security Program](/blogs/defining-roles-and-responsibilities-for-an-identity-security-program.md)
- [Detecting Session Hijacking](/blogs/detecting-session-hijacking.md)
- [8 Things to Look for in an ITDR Solution](/blogs/8-things-to-look-for-in-an-itdr-solution.md)
- [Enhancing Identity Threat Detection: Introducing Oort’s New GitHub Integration](/blogs/enhancing-identity-threat-detection-introducing-oorts-new-github-integration.md)
- [Founder Perspective: Matt Caulfield On Why He Started Oort](/blogs/founder-perspective-matt-caulfield-on-why-he-started-oort.md)
- [Founder Perspective: Vision To Reality](/blogs/founder-perspective-vision-to-reality.md)
- [Four Reasons Why Traditional SIEMs Fall Short For Identity Security Programs](/blogs/four-reasons-why-traditional-siems-fall-short-for-identity-security-programs.md)
- [How Oort Partners with Duo for Unbeatable Secure Access](/blogs/how-oort-partners-with-duo-for-unbeatable-secure-access.md)
- [Governance, Risk, and Compliance](/blogs/governance-risk-and-compliance.md)
- [How to Find Inactive Users](/blogs/how-to-find-inactive-users.md)
- [Identity and Access Management and Oort Explained](/blogs/identity-and-access-management-and-oort-explained.md)
- [5 Identity Security Questions Every IAM Leader Needs to Answer](/blogs/5-identity-security-questions-every-iam-leader-needs-to-answer.md)
- [Identity security is bigger than just ITDR](/blogs/identity-security-is-bigger-than-just-itdr.md)
- [Identity is the apex threat vector, so why is identity security still a mess?](/blogs/identity-is-the-apex-threat-vector-so-why-is-identity-security-still-a-mess.md)
- [Identity Threat Detection](/blogs/identity-threat-detection.md)
- [Identity Threat Detection and Response: what you need to know](/blogs/identity-threat-detection-and-response-what-you-need-to-know.md)
- [Identiverse 2023: What I'm Looking Forward to & What Not to Miss](/blogs/identiverse-2023-what-im-looking-forward-to-and-what-not-to-miss.md)
- [Interview with Oort: Best Practices for Managing & Protecting Service Accounts](/blogs/interview-with-oort-best-practices-for-managing-and-protecting-service-accounts.md)
- [Interview with Alex “Sasha” Zaslavsky (Oort Data Science Lead)](/blogs/interview-with-alex-sasha-zaslavsky-oort-data-science-lead.md)
- [Interview with Andy Winiarski (Head of Solutions Engineering)](/blogs/interview-with-andy-winiarski-head-of-solutions-engineering.md)
- [Interview with Nicolas Dard (Oort’s VP of Product Management)](/blogs/interview-with-nicolas-dard-oorts-vp-of-product-management.md)
- [Introducing our Latest Integration to Protect Identities in AWS](/blogs/introducing-our-latest-integration-to-protect-identities-in-aws.md)
- [Introducing The 2023 State of Identity Security Report](/blogs/introducing-the-2023-state-of-identity-security-report.md)
- [Maintaining a Strong Identity Security Posture: Why IAM Hygiene Matters](/blogs/maintaining-a-strong-identity-security-posture-why-iam-hygiene-matters.md)
- [Managing Machine Identities: A Comprehensive Guide](/blogs/managing-machine-identities-a-comprehensive-guide.md)
- [Managing Risk In Shipwreck Diving and Security](/blogs/managing-risk-in-shipwreck-diving-and-security.md)
- [Monitoring MFA Usage and Adoption: Strengthening Your Security Strategy](/blogs/monitoring-mfa-usage-and-adoption-strengthening-your-security-strategy.md)
- [Okta Breach: Why Attackers Target GitHub, and What You Can Do to Secure It](/blogs/okta-breach-why-attackers-target-github-and-what-you-can-do-to-secure-it.md)
- [Okta Security](/blogs/okta-security.md)
- [Oort and Polarity Combine to Provide Instant Context on Identities](/blogs/oort-and-polarity-combine-to-provide-instant-context-on-identities.md)
- [Oort + Polarity: Instant Identity Context to Power Investigations and Response](/blogs/oort-+-polarity-instant-identity-context-to-power-investigations-and-response.md)
- [Oort Announces $15M in Seed and Series A Funding Round](/blogs/oort-announces-usd15m-in-seed-and-series-a-funding-round.md)
- [Oort Stacks Go-to-Market Leadership Team Following Series A Investment](/blogs/oort-stacks-go-to-market-leadership-team-following-series-a-investment.md)
- [Oort Extends Identity Threat Detection with New AWS Integration](/blogs/oort-extends-identity-threat-detection-with-new-aws-integration.md)
- [Announcing General Availability of the Oort Identity Analytics & Automation Platform](/blogs/announcing-general-availability-of-the-oort-identity-analytics-and-automation-platform.md)
- [Oort Joins Forces with Microsoft Intelligent Security Association to Bring Visibility into Unmanaged Devices](/blogs/oort-joins-forces-with-microsoft-intelligent-security-association-to-bring-visibility-into-unmanaged.md)
- [Oort Joins the Microsoft Intelligent Security Association (MISA)](/blogs/oort-joins-the-microsoft-intelligent-security-association-misa.md)
- [Building an Effective Identity Security Program: A Comprehensive Handbook](/blogs/building-an-effective-identity-security-program-a-comprehensive-handbook.md)
- [Oort Launches Identity Security Platform in Auth0 Marketplace](/blogs/oort-launches-identity-security-platform-in-auth0-marketplace.md)
- [Oort Launches Identity Security Platform in AWS Marketplace](/blogs/oort-launches-identity-security-platform-in-aws-marketplace.md)
- [Oort Launches One-Click Remediation Actions for Streamlined Identity Security Response](/blogs/oort-launches-one-click-remediation-actions-for-streamlined-identity-security-response.md)
- [Oort Origins and Our Vision for Identity Security](/blogs/oort-origins-and-our-vision-for-identity-security.md)
