Blogs

Stay up to date on Cisco Identity news, product tips, and industry insights.

0ktapus for humanschevron-rightOort Releases GitHub Integration To Extend Identity Threat Detectionchevron-rightOort Recognized Twice as a Sample Vendor in Gartner® 2023 Hype Cycle Reports™chevron-rightOort's Response Capabilities: Remediate Compromised Accounts with Just One Clickchevron-rightOort Unveils Dashboard, Providing A Single Pane of Glass for Identitieschevron-rightOort’s New Identity Security Dashboardchevron-rightOort Unveils Identity Technology Ecosystem, Bringing Identity Data out of Orbit and Into Viewchevron-rightOort: Your Security Layer On Top Of Oktachevron-rightPopulating the Unpopulated: Challenges of Building a Comprehensive User Inventorychevron-rightProtecting IT Help Desk Teams Against Cyber Attackschevron-rightProtecting Salesforce Accounts from Takeovers and Ungoverned Accesschevron-rightRestrict Guest Access Permissions: Best Practices and Challengeschevron-rightSeizing the Communication Opportunity: Aligning Perspectives in Identity Securitychevron-rightSession Hijacking in a Post-Genesis Worldchevron-rightSIEM vs. Security Data Lake: Why it's Time to Rethink Your Security Programchevron-rightSpeaking the Same Language for Identity Security: Identify, Protect, Detect, Respondchevron-rightState of Identity Security research reveals 40% of accounts use weak or no form of multi-factor authentication to protect identitieschevron-rightStrengthening Identity Controls: Mapping to CIS CSC and NIST CSF Security Frameworkschevron-rightStrengthening Identity Security with Single Sign-On (SSO) Systemschevron-rightSucceeding with Proper Detection for Identity Security: A Comprehensive Approachchevron-rightTaking a Data-Driven Approach to Identity Securitychevron-rightThe Concerning Prevalence of Weak Second Factorschevron-rightThe Crucial Role of an Identity Security Leaderchevron-rightWhy I am Joining Oortchevron-rightThe Quest for a Passwordless Worldchevron-rightUnderstanding Azure Active Directory (Azure AD)chevron-rightUnderstanding the Implications of New SEC Rules on Cyber Incident Disclosurechevron-rightUnlocking the Power of Zero Trust: The Crucial Role of Identity and Oort's Identity Security Platformchevron-rightRespond Even Quicker to Identity Threatschevron-rightWhat to Look Out For at Gartner IAMchevron-right7 Critical Requirements for Securing Third-Party and Vendor Accesschevron-rightBest Practices for Efficiently Responding to Identity Threatschevron-rightAnnouncing our Identity Technology Partner Ecosystemchevron-rightCatching waves and building cloudschevron-rightCisco Announces Intent to Acquire Oortchevron-rightCISO Perspectives: Eric Richard, HubSpotchevron-rightDefining Roles & Responsibilities for an Identity Security Programchevron-rightDetecting Session Hijackingchevron-right8 Things to Look for in an ITDR Solutionchevron-rightEnhancing Identity Threat Detection: Introducing Oort’s New GitHub Integrationchevron-rightFounder Perspective: Matt Caulfield On Why He Started Oortchevron-rightFounder Perspective: Vision To Realitychevron-rightFour Reasons Why Traditional SIEMs Fall Short For Identity Security Programschevron-rightHow Oort Partners with Duo for Unbeatable Secure Accesschevron-rightGovernance, Risk, and Compliancechevron-rightHow to Find Inactive Userschevron-rightIdentity and Access Management and Oort Explainedchevron-right5 Identity Security Questions Every IAM Leader Needs to Answerchevron-rightIdentity security is bigger than just ITDRchevron-rightIdentity is the apex threat vector, so why is identity security still a mess?chevron-rightIdentity Threat Detectionchevron-rightIdentity Threat Detection and Response: what you need to knowchevron-rightIdentiverse 2023: What I'm Looking Forward to & What Not to Misschevron-rightInterview with Oort: Best Practices for Managing & Protecting Service Accountschevron-rightInterview with Alex “Sasha” Zaslavsky (Oort Data Science Lead)chevron-rightInterview with Andy Winiarski (Head of Solutions Engineering)chevron-rightInterview with Nicolas Dard (Oort’s VP of Product Management)chevron-rightIntroducing our Latest Integration to Protect Identities in AWSchevron-rightIntroducing The 2023 State of Identity Security Reportchevron-rightMaintaining a Strong Identity Security Posture: Why IAM Hygiene Matterschevron-rightManaging Machine Identities: A Comprehensive Guidechevron-rightManaging Risk In Shipwreck Diving and Securitychevron-rightMonitoring MFA Usage and Adoption: Strengthening Your Security Strategychevron-rightOkta Breach: Why Attackers Target GitHub, and What You Can Do to Secure Itchevron-rightOkta Securitychevron-rightOort and Polarity Combine to Provide Instant Context on Identitieschevron-rightOort + Polarity: Instant Identity Context to Power Investigations and Responsechevron-rightOort Announces $15M in Seed and Series A Funding Roundchevron-rightOort Stacks Go-to-Market Leadership Team Following Series A Investmentchevron-rightOort Extends Identity Threat Detection with New AWS Integrationchevron-rightAnnouncing General Availability of the Oort Identity Analytics & Automation Platformchevron-rightOort Joins Forces with Microsoft Intelligent Security Association to Bring Visibility into Unmanaged Deviceschevron-rightOort Joins the Microsoft Intelligent Security Association (MISA)chevron-rightBuilding an Effective Identity Security Program: A Comprehensive Handbookchevron-rightOort Launches Identity Security Platform in Auth0 Marketplacechevron-rightOort Launches Identity Security Platform in AWS Marketplacechevron-rightOort Launches One-Click Remediation Actions for Streamlined Identity Security Responsechevron-rightOort Origins and Our Vision for Identity Securitychevron-right