Wednesday, 12 Nov 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > AI > What Okta’s failures say about the future of identity security in 2025
AI

What Okta’s failures say about the future of identity security in 2025

Last updated: November 16, 2024 3:41 am
Published November 16, 2024
Share
What Okta’s failures say about the future of identity security in 2025
SHARE

Be a part of our each day and weekly newsletters for the newest updates and unique content material on industry-leading AI protection. Study Extra


2025 must be the 12 months id suppliers go all in on bettering each side of software program high quality and safety, together with pink teaming whereas making their apps extra clear and getting goal about outcomes past requirements.

 Anthropic, OpenAI and different main AI firms have taken pink teaming to a brand new stage, revolutionizing their launch processes for the higher. Id suppliers, together with Okta, have to comply with their lead and do the identical.

Whereas Okta is likely one of the first id administration distributors to join CISA’s Secure by Design pledge, they’re nonetheless struggling to get authentication proper. Okta’s recent advisory informed prospects that person names of 52 characters could possibly be mixed with saved cache keys, bypassing the necessity to present a password to log in. Okta recommends that prospects assembly the pre-conditions ought to examine their Okta System Log for surprising authentications from usernames larger than 52 characters between the interval of July 23, 2024, to October 30, 2024.

Okta factors to its best-in-class record for the adoption of multi-factor authentication (MFA) amongst each customers and directors of Workforce Id Cloud. That’s desk stakes to guard prospects immediately and a given to compete on this market.

Google Cloud introduced mandatory multi-factor authentication (MFA) for all customers by 2025. Microsoft has additionally made MFA required for Azure beginning in October of this 12 months. “Starting in early 2025, gradual enforcement for MFA at sign-in for Azure CLI, Azure PowerShell, Azure cell app, and Infrastructure as Code (IaC) instruments will start,” in response to a recent blog post.

Okta is getting outcomes with CISA’s Safe by Design

It’s commendable that so many id administration distributors have signed the CISA Safe by Design Pledge. Okta signed in Could of this 12 months, committing to the initiative’s seven security goals. Whereas Okta continues to make progress, challenges persist. 

Pursuing requirements whereas trying to ship new apps and platform parts is difficult. Extra problematic nonetheless is conserving a various, fast-moving sequence of DevOps, software program engineering, QA, pink groups, product administration and entrepreneurs all coordinated and targeted on the launch.  

  1. Not being demanding sufficient in relation to MFA: Okta has reported vital will increase in MFA utilization, with 91% of directors and 66% of customers utilizing MFA as of Jan. 2024. In the meantime, extra firms are making MFA necessary with out counting on a normal for it. Google and Microsoft’s necessary MFA insurance policies spotlight the hole between Okta’s voluntary measures and the {industry}’s new safety customary.
  • Vulnerability Administration wants to enhance, beginning with a stable dedication to red-teaming. Okta’s bug bounty program and vulnerability disclosure coverage are, for probably the most half, clear. The problem they’re dealing with is that their method to vulnerability administration continues to be reactive, relying totally on exterior reviews. Okta additionally wants to take a position extra in pink teaming to simulate real-world assaults and determine vulnerabilities preemptively. With out pink teaming, Okta dangers leaving particular assault vectors undetected, probably limiting its capability to handle rising threats early.
  • Logging and monitoring enhancements have to be fast-tracked. Okta is enhancing logging and monitoring capabilities for higher safety visibility, however as of Oct. 2024, many enhancements stay incomplete. Important options like real-time session monitoring and strong auditing instruments are nonetheless below improvement, which hinders Okta’s capability to offer complete, real-time intrusion detection throughout its platform. These capabilities are vital to providing prospects fast insights and responses to potential safety incidents.
See also  Why is Meta firing while still hiring?

Okta’s safety missteps present the necessity for extra strong vulnerability administration   

Whereas each id administration supplier has had its share of assaults, intrusions and breaches to take care of, it’s attention-grabbing to see how Okta is utilizing them as gasoline to re-invent itself utilizing CISA’s Safe by Design framework.

Okta’s missteps make a robust case for increasing their vulnerability administration initiatives, taking the pink teaming classes realized from Anthropic, OpenAI and different AI suppliers and making use of them to id administration.

Latest incidents Okta has skilled embody:

  • March 2021 – Verkada Digicam Breach: Attackers gained entry to over 150,000 safety cameras, exposing vital community safety vulnerabilities.
  • January 2022 – LAPSUS$ Group Compromise: The LAPSUS$ cybercriminal group exploited third-party entry to breach Okta’s setting.
  • December 2022 – Supply Code Theft: Attackers stole Okta’s supply code, pointing to inside gaps in entry controls and code safety practices. This breach highlighted the necessity for extra stringent inside controls and monitoring mechanisms to safeguard mental property.
  • October 2023 – Buyer Help Breach: Attackers gained unauthorized entry to buyer information of roughly 134 prospects by way of Okta’s help channels and was acknowledged by the corporate on October 20, beginning with stolen credentials used to realize entry to its help administration system. From there, attackers gained entry to HTTP Archive (.HAR) recordsdata that comprise energetic session cookies and started breaching Okta’s prospects, trying to penetrate their networks and exfiltrate information. 
  • October 2024 – Username Authentication Bypass: A safety flaw allowed unauthorized entry by bypassing username-based authentication. The bypass highlighted weaknesses in product testing, because the vulnerability might have been recognized and remediated via extra thorough testing and red-teaming practices.
See also  UK takes bold measures to enhance AI security for national safety

Crimson-teaming methods for future-proofing id safety

Okta and different id administration suppliers want to think about how they’ll enhance pink teaming impartial of any customary. An enterprise software program firm shouldn’t want a normal to excel at pink teaming, vulnerability administration or integrating safety throughout its system improvement lifecycles (SDLCs).

Okta and different id administration distributors can enhance their safety posture by taking the pink teaming classes realized from Anthropic and OpenAI beneath and strengthening their safety posture within the course of:   

Intentionally create extra steady, human-machine collaboration in relation to testing: Anthropic’s mix of human experience with AI-driven pink teaming uncovers hidden dangers. By simulating diversified assault eventualities in real-time, Okta can proactively determine and handle vulnerabilities earlier within the product lifecycle.

Decide to excel at adaptive id testing: OpenAI’s use of subtle id verification strategies like voice authentication and multimodal cross-validation for detecting deepfakes might encourage Okta to undertake comparable testing mechanisms. Including an adaptive id testing methodology might additionally assist Okta defend itself towards more and more superior id spoofing threats.

Prioritizing particular domains for pink teaming retains testing extra targeted: Anthropic’s focused testing in specialised areas demonstrates the worth of domain-specific pink teaming. Okta may benefit from assigning devoted groups to high-risk areas, equivalent to third-party integrations and buyer help, the place nuanced safety gaps could in any other case go undetected.

Extra automated assault simulations are wanted to stress-test id administration platforms. OpenAI’s GPT-4o mannequin makes use of automated adversarial assaults to continually pressure-test its defenses. Okta might implement comparable automated eventualities, enabling fast detection and response to new vulnerabilities, particularly in its IPSIE framework.

See also  Salesforce proves less is more: xLAM-1B 'Tiny Giant' beats bigger AI Models

Decide to extra real-time risk intelligence integration: Anthropic’s real-time information sharing inside pink groups strengthens their responsiveness. Okta can embed real-time intelligence suggestions loops into its red-teaming processes, making certain that evolving risk information instantly informs defenses and accelerates response to rising dangers.

Why 2025 will problem id safety like by no means earlier than

Adversaries are relentless of their efforts so as to add new, automated weapons to their arsenals, and each enterprise is struggling to maintain up.

With identities being the first goal of nearly all of breaches, id administration suppliers should face the challenges head-on and step up safety throughout each side of their merchandise. That should embody integrating safety into their SDLC and serving to DevOps groups turn into conversant in safety so it’s not an afterthought that’s rushed via instantly earlier than launch.

CISA’s Safe by Design initiative is invaluable for each cybersecurity supplier, and that’s particularly the case for id administration distributors. Okta’s experiences with Safe by Design helped them discover gaps in vulnerability administration, logging and monitoring. However Okta shouldn’t cease there. They should go all in on a renewed, extra intense deal with pink teaming, taking the teachings realized from Anthropic and OpenAI.

Bettering the accuracy, latency and high quality of information via pink teaming is the gasoline any software program firm must create a tradition of steady enchancment. CISA’s Safe by Design is simply the place to begin, not the vacation spot. Id administration distributors going into 2025 have to see requirements for what they’re: precious frameworks for guiding steady enchancment. Having an skilled, stable pink group operate that may catch errors earlier than they ship and simulate aggressive assaults from more and more expert and well-funded adversaries is among the many most potent weapons in an id administration supplier’s arsenal. Crimson teaming is core to staying aggressive whereas having a preventing likelihood to remain at parity with adversaries.

Author’s observe: Particular due to Taryn Plumb for her collaboration and contributions to gathering insights and information.


Source link
TAGGED: failures, Future, identity, Oktas, security
Share This Article
Twitter Email Copy Link Print
Previous Article Plantible Founders Tony Martens Fekini and Maurits van de Ven Plantible Foods Raises $30M in Series B Funding
Next Article beta bionics Beta Bionics Closes $60M Series E Financing
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Alphabet commits $75 billion to build out AI data centres

Alphabet, the mother or father firm of Google, has introduced plans to speculate round $75…

February 6, 2025

Data Center Trends to Watch in 2025: Expert Predictions

The info heart {industry} in 2025 stands on the crossroads of unprecedented demand and transformative…

January 9, 2025

3D printing with tunable color creates microscale replica of famous statue

3D microstructure with a number of colours and the thermo-response. Left, depiction of the standard…

May 18, 2025

Adaptive smart glove can teach new physical skills

A digitally embroidered sensible glove developed at MIT can help with piano classes and human-robot…

February 26, 2024

Not the Villain We Make It

Within the realm of IT infrastructure, legacy can usually really feel like a foul phrase.…

September 4, 2025

You Might Also Like

Google reveals its own version of Apple’s AI cloud
AI

Google reveals its own version of Apple’s AI cloud

By saad
Baidu just dropped an open-source multimodal AI that it claims beats GPT-5 and Gemini
AI

Baidu just dropped an open-source multimodal AI that it claims beats GPT-5 and Gemini

By saad
Security lapses emerge amid the global AI race
AI

Security lapses emerge amid the global AI race

By saad
Only 9% of developers think AI code can be used without human oversight, BairesDev survey reveals
AI

Only 9% of developers think AI code can be used without human oversight, BairesDev survey reveals

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.