Blogs

Stay up to date on Cisco Identity news, product tips, and industry insights.

0ktapus for humansOort Releases GitHub Integration To Extend Identity Threat DetectionOort Recognized Twice as a Sample Vendor in Gartner® 2023 Hype Cycle Reports™Oort's Response Capabilities: Remediate Compromised Accounts with Just One ClickOort Unveils Dashboard, Providing A Single Pane of Glass for IdentitiesOort’s New Identity Security DashboardOort Unveils Identity Technology Ecosystem, Bringing Identity Data out of Orbit and Into ViewOort: Your Security Layer On Top Of OktaPopulating the Unpopulated: Challenges of Building a Comprehensive User InventoryProtecting IT Help Desk Teams Against Cyber AttacksProtecting Salesforce Accounts from Takeovers and Ungoverned AccessRestrict Guest Access Permissions: Best Practices and ChallengesSeizing the Communication Opportunity: Aligning Perspectives in Identity SecuritySession Hijacking in a Post-Genesis WorldSIEM vs. Security Data Lake: Why it's Time to Rethink Your Security ProgramSpeaking the Same Language for Identity Security: Identify, Protect, Detect, RespondState of Identity Security research reveals 40% of accounts use weak or no form of multi-factor authentication to protect identitiesStrengthening Identity Controls: Mapping to CIS CSC and NIST CSF Security FrameworksStrengthening Identity Security with Single Sign-On (SSO) SystemsSucceeding with Proper Detection for Identity Security: A Comprehensive ApproachTaking a Data-Driven Approach to Identity SecurityThe Concerning Prevalence of Weak Second FactorsThe Crucial Role of an Identity Security LeaderWhy I am Joining OortThe Quest for a Passwordless WorldUnderstanding Azure Active Directory (Azure AD)Understanding the Implications of New SEC Rules on Cyber Incident DisclosureUnlocking the Power of Zero Trust: The Crucial Role of Identity and Oort's Identity Security PlatformRespond Even Quicker to Identity ThreatsWhat to Look Out For at Gartner IAM7 Critical Requirements for Securing Third-Party and Vendor AccessBest Practices for Efficiently Responding to Identity ThreatsAnnouncing our Identity Technology Partner EcosystemCatching waves and building cloudsCisco Announces Intent to Acquire OortCISO Perspectives: Eric Richard, HubSpotDefining Roles & Responsibilities for an Identity Security ProgramDetecting Session Hijacking8 Things to Look for in an ITDR SolutionEnhancing Identity Threat Detection: Introducing Oort’s New GitHub IntegrationFounder Perspective: Matt Caulfield On Why He Started OortFounder Perspective: Vision To RealityFour Reasons Why Traditional SIEMs Fall Short For Identity Security ProgramsHow Oort Partners with Duo for Unbeatable Secure AccessGovernance, Risk, and ComplianceHow to Find Inactive UsersIdentity and Access Management and Oort Explained5 Identity Security Questions Every IAM Leader Needs to AnswerIdentity security is bigger than just ITDRIdentity is the apex threat vector, so why is identity security still a mess?Identity Threat DetectionIdentity Threat Detection and Response: what you need to knowIdentiverse 2023: What I'm Looking Forward to & What Not to MissInterview with Oort: Best Practices for Managing & Protecting Service AccountsInterview with Alex “Sasha” Zaslavsky (Oort Data Science Lead)Interview with Andy Winiarski (Head of Solutions Engineering)Interview with Nicolas Dard (Oort’s VP of Product Management)Introducing our Latest Integration to Protect Identities in AWSIntroducing The 2023 State of Identity Security ReportMaintaining a Strong Identity Security Posture: Why IAM Hygiene MattersManaging Machine Identities: A Comprehensive GuideManaging Risk In Shipwreck Diving and SecurityMonitoring MFA Usage and Adoption: Strengthening Your Security StrategyOkta Breach: Why Attackers Target GitHub, and What You Can Do to Secure ItOkta SecurityOort and Polarity Combine to Provide Instant Context on IdentitiesOort + Polarity: Instant Identity Context to Power Investigations and ResponseOort Announces $15M in Seed and Series A Funding RoundOort Stacks Go-to-Market Leadership Team Following Series A InvestmentOort Extends Identity Threat Detection with New AWS IntegrationAnnouncing General Availability of the Oort Identity Analytics & Automation PlatformOort Joins Forces with Microsoft Intelligent Security Association to Bring Visibility into Unmanaged DevicesOort Joins the Microsoft Intelligent Security Association (MISA)Building an Effective Identity Security Program: A Comprehensive HandbookOort Launches Identity Security Platform in Auth0 MarketplaceOort Launches Identity Security Platform in AWS MarketplaceOort Launches One-Click Remediation Actions for Streamlined Identity Security ResponseOort Origins and Our Vision for Identity Security