Okta Ventures invests in founders building across a range of IT, security, consumer, and enterprise domains. In our discussions with portfolio founders, shared customers, and industry experts, we’re in a privileged position to hear first-hand about new trends, challenges, regulations, and technology shifts as they unfold and affect security…
Chief information officers, directors, and other security leaders must walk a fine line between protecting data and ensuring authorized users have seamless access to tools and services. Their Identity and authentication strategies are responsible for proactively mitigating and remediating threats in a way that protects users’ trust. However,…
Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security postures and programs that support its over 19,000 customers.
Charlotte has an extensive background in the delivery of security transformation…
Security lives at the nexus of “vitally important” and “constantly changing,” which means lots of opportunity and just as many challenges.
David Bradbury, Okta’s chief security officer, keeps his eye on both Okta’s own security and the overall security landscape — making him an ideal resource for understanding current security best practices and…
Among the longstanding challenges that information security leaders have grappled with for years, one stands out: the difficulty of balancing user experience and security. The traditional tug-of-war between ease of access to business-critical applications and resources and robust protection from hackers has never been easy.
Until now.
The…
This spring and summer, companies across many verticals have had no choice but to buckle up and shift into full support for remote work, and retooling as quickly as possible to secure anytime, anywhere, any-device access for their teams
Companies are calling on their Chief Security Officers to lead this incredibly rapid shift into the cloud future…
We often talk about how the enterprise is changing and evolving—but the transformation we’ve seen in the past two months is unparalleled. In a matter of weeks, hundreds of millions of people around the world have had to make the shift to remote work and companies have had to migrate their business operations and offerings online.
Times like these…
Transparency is a great way for cloud providers to demonstrate and prove good security practices to their customers. Often times, however, the transparency stops when outages or service hiccups occur. During an incident, how a cloud provider communicates to its customers says a lot. In a guest post for the Cloud Security Alliance, I discuss why…
I recently released the first, second and third installments of a six-part blog series about what it takes to have an enterprise-ready cloud service, and the three characteristics that differentiate an enterprise-grade cloud service from a typical consumer service: security, reliability and trust. As a quick refresher, there are five categories to…
The barrage of articles and blogs that cropped up following the personal identity hack on Wired’s Mat Honan got me thinking about the importance of security in the cloud. In my experience, what happened to Mat is not a unique issue. In fact, it’s actually a somewhat typical downside to – what I call – consumer cloud services.
It was, no doubt, a…