Okta hasn't had a very good run of security headlines lately, and the latest is a breach that resulted in the theft of session tokens of several customers from Okta's customer support system. Though the number of customers was relatively low, the unauthorized access went undetected for over two weeks. The root cause seems to have come from an employee logging into their personal Google account and saving a username and password withing the Chrome browser.

Time Stamps:
0:00 - Welcome to the Rundown
0:42 - ZEDEDA Deploys Kubernetes at The Edge
3:33 - CloudFlare Outage
6:04 - Palo Alto Buys Talon Cyber Security
9:49 - Using Google Calendar for Command and Control
12:58 - Updated Security Frameworks (CVSS 4.0 and MITRE ATT&CK 14)
18:12 - Okta Breach Blamed on User's Personal Google Login
28:27 - The Weeks Ahead
29:38 - Thanks for Watching


Follow our Hosts on Social Media


Tom Hollingsworth: ⁠https://www.twitter.com/NetworkingNerd⁠


Brian Knudtson: ⁠https://www.linkedin.com/in/bknudtson/⁠


Follow Gestalt IT


Website: ⁠https://www.GestaltIT.com/⁠


Twitter: ⁠https://www.twitter.com/GestaltIT⁠


LinkedIn: ⁠https://www.linkedin.com/company/Gestalt-IT


Tags: #Rundown, #Kubernetes, #Edge, #SASE, #Malware, @ZEDEDAEdge, @Cloudflare, @PaloAltoNetworks, @TalonCyber, @FIRSTdotOrg, @MITREcorp @Okta, @Google, #XFD10, #Security, @NetworkingNerd, @BKnudtson, @GestaltIT,

Twitter Mentions