Too busy to watch the ESG + Okta Webinar: How Identity Fits Into a Security-First Approach? Don’t worry. We’ve got you covered.
IT analyst firm Enterprise Strategy Group (ESG) recently conducted a study into identity and access management, and the challenges presented by the cloud and mobile computing wave. Spoiler alert: Identity can reduce…
In any organization, there’s one key resource that cannot be replaced: people. Even though technology is seen as the great business enabler of the 21st century, organizations must still focus their efforts on managing their human resources. After all, it’s people who are responsible for thinking creatively, generating new products, solving…
Last week, I was in Washington, D.C. to officially open the doors of Okta’s new office in the epicenter of the nation’s capital where the public and private sectors meet. The location of the office also serves as a reminder of the balance that needs to be struck between technological innovation and security, topics of great interest and discussion…
The Forrester Zero Trust model, which has been around since 2009, argues that organizations should regard all network traffic as untrusted, regardless of where it’s coming from. The idea of a trusted internal perimeter leaves the organization at risk if that perimeter is compromised or an insider turns malicious.
Of course, the situation has…
Organizations are increasingly building custom apps to interact with their customers, employees, partners, and contractors. The problem, of course, is that a successful digital strategy is simply not possible without a secure presence everywhere. Apps need to be available on iOS, Android, and Alexa, just to name a few. Moreover, users demand an…
HackerOne was started by hackers and security leaders who are driven by a passion to make the Internet safer. They partner with the global hacker community to surface the most relevant security issues before they can be exploited by criminals. HackerOne hosts live-hacking events around the world throughout the year. One of the largest of these, h1…
Women@Okta (W@Okta) recently launched a new program called W@Okta Talks, where Okta employees have the opportunity to present on the topic of their choice, and have so far included topics such as productivity and career growth. For our August event, we organized a panel focused on women in tech sales (watch the panel here). We invited external…
In today’s threat landscape, cybersecurity vulnerabilities can originate from a variety of places. An exploitable gap in one vendor’s technology can have serious, cascading repercussions across an entire organization, large or small. This reality is one of the reasons that Okta’s Research and Exploitation (REX) team constantly performs security…
In a world driven by digital disruption, several tech trends are shaping the business landscape of tomorrow. Business leaders have a choice: put into practice strategies that reap the benefits of these new innovations or get left behind. These are four of the most critical trends that business leaders need to consider.
The four business trends you…
Mergers and acquisitions (M&A) are common for organizations seeking new markets, technologies, and resources. Not only do they provide organizations with an accelerated growth path, they also allow them to gain key assets rapidly.
Although M&As are great for business, they produce a range of challenges for IT teams. Consolidating multiple…