A new year is here, and with it come new resolutions, possibilities, and — regrettably — threats.
No, threat actors won’t just change their ways with the flip of the calendar. Instead, they’ll double down on what’s been working and experiment with new ways of evading detection and exploiting vulnerabilities.
While we can’t anticipate every…
In this guest post, Thoughtworks’ CISO Nitin Raina and Head of Security Architecture Nazneen Rupawalla share their outlook on the security landscape for 2025, including emerging risks and fresh approaches to confronting them.
As security leaders, we’re always monitoring for new threats looming just over the horizon. To protect our business and our…
Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security postures and programs that support its over 19,000 customers.
Charlotte has an extensive background in the delivery of security transformation…
Security often gets a bad rap for slowing down productivity and hampering user experience (UX). At Okta, we know this couldn't be further from the truth. Today's CISOs are deeply committed to creating frictionless experiences for employees and customers, and we recently spoke with two of them to get their take on balancing these crucial business…
The pressure is on for CISOs to prove that security isn’t just a cost center, but a strategic driver of business growth and resilience. But justifying security investments to the board is an ongoing challenge, especially given the cost of managing risk and protecting organizational assets. It’s a delicate balancing act where CISOs must demonstrate…
While the term “Zero Trust” is ubiquitous enough to feel like a buzzword, adoption of the security framework is not as widespread as you might think.
The security industry has been discussing the reality of the shifting perimeter for nearly two decades, with origins back to the Jericho Forum, an international group working to define and promote…
Among the longstanding challenges that information security leaders have grappled with for years, one stands out: the difficulty of balancing user experience and security. The traditional tug-of-war between ease of access to business-critical applications and resources and robust protection from hackers has never been easy.
Until now.
The…
The job of a CISO is a tough one. Adaptability is key in a field where change is the only real constant, as new laws, evolving regulations, and increasingly complex security threats challenge even the most seasoned executive.
While many of the regulations that CISOs deal with are industry specific, the approach to compliance (ensuring teams have…
As corporate employees are now regularly accessing their enterprise applications and data from mobile devices and cloud applications, the traditional idea of the enterprise network boundary is vanishing. Enterprises are grappling with the reality where the network perimeter is defined by the employee identity. Securing this “Identity Perimeter”…
Usable security. Does it exist?
That’s a question our CEO Todd McKinnon recently sat down to discuss with a16z’s Michael Copeland and Pindrop Security’s co-founder and CEO Vijay Balasubramaniyan. Whether it’s through an experience that’s almost invisible in a user’s workflow or the promise of simple security with an added authentication layer,…