Earlier this week, Nissan confirmed a network hack that comprised both employee names and encrypted passwords. Nicole Perlroth of the New York Times covered the news, citing the commentary of Nissan spokesperson David Reuter and Shawn Henry, former FBI cyber-cop. Perlroth reported that Nissan tracked the hacks back to an IP address, but according…
Computerworld’s Jaikumar Vijayan story today on the Utah Department of Health security breach that exposed approximately 280,000 Social Security numbers highlights a point we’ve written about many times in the past: Weak, easy-to-guess passwords are perhaps the biggest threat to IT security. According to Vijayan:
“ … the hackers -- believed to be…
In a post this morning on Fast Company, I reflect on the management lessons I've learned since leaving salesforce.com to start Okta. Building and running a successful company, as a CEO, takes a completely different set of skills than running an engineering team. Have a look, and be sure to head over to Fast Company to read the full article:
Before…
Last week, we talked about the some of the challenges associated with the use of consumer mobile devices in business. This week we wanted to dig a little deeper into what exactly these challenges are. In a recent post for TechTarget, Michelle Boisvert outlines where the security risks come into play with BYOD and how they require a strong cloud…
As more and more IT services get shifted to the cloud, the demand for talent becomes an increasingly important issue. In an article for CIO, Meredith Levinson describes the challenges facing CIOs in finding employees. Levinson cites data from Wanted Analytics that found from February 2011 to 2012 there was a 99 percent increase in job ads for IT…
In a recent article for the Wall Street Journal, Shara Tibken addresses enterprise tablet adoption and its impact on IT networks.
"Companies everywhere are adopting tablets,” Tibken writes. “Forrester Research Inc. estimates that about 25% of computers used for work globally are tablets and smartphones, not PCs."
Rapid — and mass — adoption of…
At Okta, we’ve gone through many iterations of using Jenkins to build and test our software. We use a number of tools to make sure our code works properly, and we like to have Jenkins manage these. The list would be familiar to anyone using the Java environment; PMD, Cobertura, unit and functional tests with JUnit, Selenium tests with testNG, and…