Securing Layer 7: The Closest Point to the End User

Building and maintaining Okta’s security program is an interesting job, to say the least. The stakes are high: Not only is identity management core to IT, it is central to an enterprise’s security. Plus, Okta delivers IDM from the cloud, so between mobile devices, third-party partners and the inherent security concerns associated with user habits,…

Why Ex-Entrepreneurs Make the Best Venture Capitalists

Are ex-entrepreneurs best equipped to succeed as venture capitalists? That’s the topic of the week over at the Wall Street Journal’s ‘Accelerators’ blog, and I weigh in: When Investing in CEOs, It Takes One to Know One. Successful VCs come in all shades but, in my mind, those who have started their own companies have a little something extra in…

Forget Disaster Recovery, Let’s Talk Disaster Avoidance

“What’s your disaster recovery plan?” It’s a question I’ve been getting from customers quite a bit lately. And it caught me off guard the first time I heard it. Typically, inquiries on disaster recovery come from someone on an audit team who has the daunting task of creating a disaster recovery and business continuity plan across the entire…

Archive

Follow Us