
Elizabeth Baier
Supervising Editor at WUNC-FM (Chapel Hill, NC)
Digital News Editor at @wunc. Occasional Adjunct Instructor @UNCHussman. Latina, daughter of immigrants. Previously with @MPRNews, @miamiherald, @sunsentinel.
Articles
-
Dec 9, 2024 |
okta.com | Elizabeth Baier
Early Access for Secure SaaS Service Accounts, a new feature in Okta Privileged Access, is now available. With this new feature, we aim to help customers protect service accounts across an organization with account takeover, vaulting, and password rotations. Whether they’re service, shared, or break-glass accounts, security and IT teams can take control of non-federated accounts in an organization’s SaaS environment and manage them as part of their broader Identity posture.
-
Dec 5, 2024 |
okta.com | Elizabeth Baier
Da die Zahl und Raffinesse der Cyberbedrohungen kontinuierlich zunimmt, müssen Unternehmen auf jedem Gerät und System dringend Phishing-sichere Authentifizierungsprotokolle durchsetzen. Gestohlene Anmeldedaten sind der häufigste Angriffsvektor bei erfolgreichen Sicherheitsverletzungen. Deshalb benötigen Security-Teams eine robuste Identity-Strategie, die potenziellen Angreifern im Moment der Attacke einen Strich durch die Rechnung macht.
-
Dec 5, 2024 |
okta.com | Elizabeth Baier
Tandis que la fréquence et la sophistication des cybermenaces continuent de s'intensifier, les entreprises doivent impérativement mettre en œuvre des protocoles d'authentification résistants au phishing au niveau de chaque terminal et système. Les identifiants volés sont les principaux vecteurs d'attaque initiaux dans les compromissions. Dès lors, les équipes sécurité doivent s'armer de stratégies d'identité robustes, capables de contrecarrer les acteurs malveillants au moment de l'attaque.
-
Sep 12, 2024 |
okta.com | Elizabeth Baier
If a data breach happens at your organization, you can’t afford to compromise on the speed and efficacy of your response. For the best possible defense against cybersecurity threats, security leaders need a comprehensive approach to Identity-powered security that supports risk mitigation in scenarios when would-be attackers have already exploited stolen credentials. Managing post-authorization Identity security with individual point solutions delivers poor outcomes.
-
Sep 10, 2024 |
okta.com | Elizabeth Baier
As the frequency and sophistication of cyberthreats continue to rise, organizations must urgently enforce phishing-resistant authentication protocols across every device and system. Stolen credentials are the leading initial vector of attack in successful breaches, which means security teams need to arm themselves with a robust Identity strategy capable of thwarting would-be attackers at the moment of attack.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →Coverage map
X (formerly Twitter)
- Followers
- 2K
- Tweets
- 4K
- DMs Open
- No

Welcome, Colin!

📣 We're excited to share that @RaleighReporter will be joining WUNC later this month as the station's new Capitol Bureau Chief. Read the full announcement here: https://t.co/eWDdUOMfYw

RT @wunc: Andrew Brown Jr.'s death has sparked an awakening in Pasquotank County. More people are paying attention to local politics and po…

RT @wunc: IT’S OVER. In the first-ever NCAA Tournament meeting between the men’s basketball teams at UNC and Duke, the Tar Heels win at th…