In the hyperconnected world that we live in, our apps, data and personal information are only a swipe away. But without the proper encryption and identity management tools in place, a hungry hacker can almost as easily swipe away that data. Put simply, the threat landscape is far more treacherous than it was even a year ago. In 2013, CSA released “The Notorious Nine” – the nine most severe threats to cloud computing, with data breaches, account hijacking and shared technology issues at the top of the list – and we’ve seen these issues become very real in 2014. The recent problems we’ve seen with organizations like Target, P.F. Changs and Community Health Systems have forced many CIOs and CSOs to ask the question: what can we do to maintain control and security around critical company information? We recently hit the road with Okta CSO David Baker.