# Blogs

- [0ktapus for humans](https://docs.oort.io/blogs/0ktapus-for-humans.md): Sep 13, 2022
- [Oort Releases GitHub Integration To Extend Identity Threat Detection](https://docs.oort.io/blogs/oort-releases-github-integration-to-extend-identity-threat-detection.md)
- [Oort Recognized Twice as a Sample Vendor in Gartner® 2023 Hype Cycle Reports™](https://docs.oort.io/blogs/oort-recognized-twice-as-a-sample-vendor-in-gartner-r-2023-hype-cycle-reports-tm.md)
- [Oort's Response Capabilities: Remediate Compromised Accounts with Just One Click](https://docs.oort.io/blogs/oorts-response-capabilities-remediate-compromised-accounts-with-just-one-click.md)
- [Oort Unveils Dashboard, Providing A Single Pane of Glass for Identities](https://docs.oort.io/blogs/oort-unveils-dashboard-providing-a-single-pane-of-glass-for-identities.md)
- [Oort’s New Identity Security Dashboard](https://docs.oort.io/blogs/oorts-new-identity-security-dashboard.md)
- [Oort Unveils Identity Technology Ecosystem, Bringing Identity Data out of Orbit and Into View](https://docs.oort.io/blogs/oort-unveils-identity-technology-ecosystem-bringing-identity-data-out-of-orbit-and-into-view.md)
- [Oort: Your Security Layer On Top Of Okta](https://docs.oort.io/blogs/oort-your-security-layer-on-top-of-okta.md)
- [Populating the Unpopulated: Challenges of Building a Comprehensive User Inventory](https://docs.oort.io/blogs/populating-the-unpopulated-challenges-of-building-a-comprehensive-user-inventory.md)
- [Protecting IT Help Desk Teams Against Cyber Attacks](https://docs.oort.io/blogs/protecting-it-help-desk-teams-against-cyber-attacks.md)
- [Protecting Salesforce Accounts from Takeovers and Ungoverned Access](https://docs.oort.io/blogs/protecting-salesforce-accounts-from-takeovers-and-ungoverned-access.md)
- [Restrict Guest Access Permissions: Best Practices and Challenges](https://docs.oort.io/blogs/restrict-guest-access-permissions-best-practices-and-challenges.md)
- [Seizing the Communication Opportunity: Aligning Perspectives in Identity Security](https://docs.oort.io/blogs/seizing-the-communication-opportunity-aligning-perspectives-in-identity-security.md)
- [Session Hijacking in a Post-Genesis World](https://docs.oort.io/blogs/session-hijacking-in-a-post-genesis-world.md)
- [SIEM vs. Security Data Lake: Why it's Time to Rethink Your Security Program](https://docs.oort.io/blogs/siem-vs.-security-data-lake-why-its-time-to-rethink-your-security-program.md)
- [Speaking the Same Language for Identity Security: Identify, Protect, Detect, Respond](https://docs.oort.io/blogs/speaking-the-same-language-for-identity-security-identify-protect-detect-respond.md)
- [State of Identity Security research reveals 40% of accounts use weak or no form of multi-factor authentication to protect identities](https://docs.oort.io/blogs/state-of-identity-security-research-reveals-40-of-accounts-use-weak-or-no-form-of-multi-factor-authe.md)
- [Strengthening Identity Controls: Mapping to CIS CSC and NIST CSF Security Frameworks](https://docs.oort.io/blogs/strengthening-identity-controls-mapping-to-cis-csc-and-nist-csf-security-frameworks.md)
- [Strengthening Identity Security with Single Sign-On (SSO) Systems](https://docs.oort.io/blogs/strengthening-identity-security-with-single-sign-on-sso-systems.md)
- [Succeeding with Proper Detection for Identity Security: A Comprehensive Approach](https://docs.oort.io/blogs/succeeding-with-proper-detection-for-identity-security-a-comprehensive-approach.md)
- [Taking a Data-Driven Approach to Identity Security](https://docs.oort.io/blogs/taking-a-data-driven-approach-to-identity-security.md)
- [The Concerning Prevalence of Weak Second Factors](https://docs.oort.io/blogs/the-concerning-prevalence-of-weak-second-factors.md)
- [The Crucial Role of an Identity Security Leader](https://docs.oort.io/blogs/the-crucial-role-of-an-identity-security-leader.md)
- [Why I am Joining Oort](https://docs.oort.io/blogs/why-i-am-joining-oort.md)
- [The Quest for a Passwordless World](https://docs.oort.io/blogs/the-quest-for-a-passwordless-world.md)
- [Understanding Azure Active Directory (Azure AD)](https://docs.oort.io/blogs/understanding-azure-active-directory-azure-ad.md)
- [Understanding the Implications of New SEC Rules on Cyber Incident Disclosure](https://docs.oort.io/blogs/understanding-the-implications-of-new-sec-rules-on-cyber-incident-disclosure.md)
- [Unlocking the Power of Zero Trust: The Crucial Role of Identity and Oort's Identity Security Platform](https://docs.oort.io/blogs/unlocking-the-power-of-zero-trust-the-crucial-role-of-identity-and-oorts-identity-security-platform.md)
- [Respond Even Quicker to Identity Threats](https://docs.oort.io/blogs/respond-even-quicker-to-identity-threats.md)
- [What to Look Out For at Gartner IAM](https://docs.oort.io/blogs/what-to-look-out-for-at-gartner-iam.md)
- [7 Critical Requirements for Securing Third-Party and Vendor Access](https://docs.oort.io/blogs/7-critical-requirements-for-securing-third-party-and-vendor-access.md)
- [Best Practices for Efficiently Responding to Identity Threats](https://docs.oort.io/blogs/best-practices-for-efficiently-responding-to-identity-threats.md)
- [Announcing our Identity Technology Partner Ecosystem](https://docs.oort.io/blogs/announcing-our-identity-technology-partner-ecosystem.md)
- [Catching waves and building clouds](https://docs.oort.io/blogs/catching-waves-and-building-clouds.md)
- [Cisco Announces Intent to Acquire Oort](https://docs.oort.io/blogs/cisco-announces-intent-to-acquire-oort.md)
- [CISO Perspectives: Eric Richard, HubSpot](https://docs.oort.io/blogs/ciso-perspectives-eric-richard-hubspot.md)
- [Defining Roles & Responsibilities for an Identity Security Program](https://docs.oort.io/blogs/defining-roles-and-responsibilities-for-an-identity-security-program.md)
- [Detecting Session Hijacking](https://docs.oort.io/blogs/detecting-session-hijacking.md)
- [8 Things to Look for in an ITDR Solution](https://docs.oort.io/blogs/8-things-to-look-for-in-an-itdr-solution.md)
- [Enhancing Identity Threat Detection: Introducing Oort’s New GitHub Integration](https://docs.oort.io/blogs/enhancing-identity-threat-detection-introducing-oorts-new-github-integration.md)
- [Founder Perspective: Matt Caulfield On Why He Started Oort](https://docs.oort.io/blogs/founder-perspective-matt-caulfield-on-why-he-started-oort.md)
- [Founder Perspective: Vision To Reality](https://docs.oort.io/blogs/founder-perspective-vision-to-reality.md)
- [Four Reasons Why Traditional SIEMs Fall Short For Identity Security Programs](https://docs.oort.io/blogs/four-reasons-why-traditional-siems-fall-short-for-identity-security-programs.md)
- [How Oort Partners with Duo for Unbeatable Secure Access](https://docs.oort.io/blogs/how-oort-partners-with-duo-for-unbeatable-secure-access.md)
- [Governance, Risk, and Compliance](https://docs.oort.io/blogs/governance-risk-and-compliance.md)
- [How to Find Inactive Users](https://docs.oort.io/blogs/how-to-find-inactive-users.md)
- [Identity and Access Management and Oort Explained](https://docs.oort.io/blogs/identity-and-access-management-and-oort-explained.md)
- [5 Identity Security Questions Every IAM Leader Needs to Answer](https://docs.oort.io/blogs/5-identity-security-questions-every-iam-leader-needs-to-answer.md)
- [Identity security is bigger than just ITDR](https://docs.oort.io/blogs/identity-security-is-bigger-than-just-itdr.md)
- [Identity is the apex threat vector, so why is identity security still a mess?](https://docs.oort.io/blogs/identity-is-the-apex-threat-vector-so-why-is-identity-security-still-a-mess.md)
- [Identity Threat Detection](https://docs.oort.io/blogs/identity-threat-detection.md)
- [Identity Threat Detection and Response: what you need to know](https://docs.oort.io/blogs/identity-threat-detection-and-response-what-you-need-to-know.md)
- [Identiverse 2023: What I'm Looking Forward to & What Not to Miss](https://docs.oort.io/blogs/identiverse-2023-what-im-looking-forward-to-and-what-not-to-miss.md)
- [Interview with Oort: Best Practices for Managing & Protecting Service Accounts](https://docs.oort.io/blogs/interview-with-oort-best-practices-for-managing-and-protecting-service-accounts.md)
- [Interview with Alex “Sasha” Zaslavsky (Oort Data Science Lead)](https://docs.oort.io/blogs/interview-with-alex-sasha-zaslavsky-oort-data-science-lead.md)
- [Interview with Andy Winiarski (Head of Solutions Engineering)](https://docs.oort.io/blogs/interview-with-andy-winiarski-head-of-solutions-engineering.md)
- [Interview with Nicolas Dard (Oort’s VP of Product Management)](https://docs.oort.io/blogs/interview-with-nicolas-dard-oorts-vp-of-product-management.md)
- [Introducing our Latest Integration to Protect Identities in AWS](https://docs.oort.io/blogs/introducing-our-latest-integration-to-protect-identities-in-aws.md)
- [Introducing The 2023 State of Identity Security Report](https://docs.oort.io/blogs/introducing-the-2023-state-of-identity-security-report.md)
- [Maintaining a Strong Identity Security Posture: Why IAM Hygiene Matters](https://docs.oort.io/blogs/maintaining-a-strong-identity-security-posture-why-iam-hygiene-matters.md)
- [Managing Machine Identities: A Comprehensive Guide](https://docs.oort.io/blogs/managing-machine-identities-a-comprehensive-guide.md)
- [Managing Risk In Shipwreck Diving and Security](https://docs.oort.io/blogs/managing-risk-in-shipwreck-diving-and-security.md)
- [Monitoring MFA Usage and Adoption: Strengthening Your Security Strategy](https://docs.oort.io/blogs/monitoring-mfa-usage-and-adoption-strengthening-your-security-strategy.md)
- [Okta Breach: Why Attackers Target GitHub, and What You Can Do to Secure It](https://docs.oort.io/blogs/okta-breach-why-attackers-target-github-and-what-you-can-do-to-secure-it.md)
- [Okta Security](https://docs.oort.io/blogs/okta-security.md)
- [Oort and Polarity Combine to Provide Instant Context on Identities](https://docs.oort.io/blogs/oort-and-polarity-combine-to-provide-instant-context-on-identities.md)
- [Oort + Polarity: Instant Identity Context to Power Investigations and Response](https://docs.oort.io/blogs/oort-+-polarity-instant-identity-context-to-power-investigations-and-response.md)
- [Oort Announces $15M in Seed and Series A Funding Round](https://docs.oort.io/blogs/oort-announces-usd15m-in-seed-and-series-a-funding-round.md)
- [Oort Stacks Go-to-Market Leadership Team Following Series A Investment](https://docs.oort.io/blogs/oort-stacks-go-to-market-leadership-team-following-series-a-investment.md)
- [Oort Extends Identity Threat Detection with New AWS Integration](https://docs.oort.io/blogs/oort-extends-identity-threat-detection-with-new-aws-integration.md)
- [Announcing General Availability of the Oort Identity Analytics & Automation Platform](https://docs.oort.io/blogs/announcing-general-availability-of-the-oort-identity-analytics-and-automation-platform.md)
- [Oort Joins Forces with Microsoft Intelligent Security Association to Bring Visibility into Unmanaged Devices](https://docs.oort.io/blogs/oort-joins-forces-with-microsoft-intelligent-security-association-to-bring-visibility-into-unmanaged.md)
- [Oort Joins the Microsoft Intelligent Security Association (MISA)](https://docs.oort.io/blogs/oort-joins-the-microsoft-intelligent-security-association-misa.md)
- [Building an Effective Identity Security Program: A Comprehensive Handbook](https://docs.oort.io/blogs/building-an-effective-identity-security-program-a-comprehensive-handbook.md)
- [Oort Launches Identity Security Platform in Auth0 Marketplace](https://docs.oort.io/blogs/oort-launches-identity-security-platform-in-auth0-marketplace.md)
- [Oort Launches Identity Security Platform in AWS Marketplace](https://docs.oort.io/blogs/oort-launches-identity-security-platform-in-aws-marketplace.md)
- [Oort Launches One-Click Remediation Actions for Streamlined Identity Security Response](https://docs.oort.io/blogs/oort-launches-one-click-remediation-actions-for-streamlined-identity-security-response.md)
- [Oort Origins and Our Vision for Identity Security](https://docs.oort.io/blogs/oort-origins-and-our-vision-for-identity-security.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.oort.io/blogs.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
