Incident Response
In this photo illustration, a silhouetted woman holds a smartphone with the Okta logo displayed on the screen.![](https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt1e9118efe47a92de/656f51ff35e50b040a6edb76/Okta_breach_2JAP95E.jpg?width=700&auto=webp&quality=80&disable=upscale)
Cyber Resilience![](https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt1e9118efe47a92de/656f51ff35e50b040a6edb76/Okta_breach_2JAP95E.jpg?width=700&auto=webp&quality=80&disable=upscale)
Massive Okta Breach: What CISOs Should KnowMassive Okta Breach: What CISOs Should Know
After Okta’s admission last week that 100% of its 18,400 customers were exposed to a breach of its customer support system, security experts are pondering the impact and future solutions.
Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.