COVID-19 Technology Trends Through Our Partners

The COVID-19 pandemic has created unprecedented challenges for organizations around the world, especially within industries like Healthcare, Finance, and Government. In addition to being customer-centric, Okta is also a company built on partners. Many of our Solution Provider partners, especially, are working closely with our joint customers to…

Okta’s New CSO on Preparing for the Future

We often talk about how the enterprise is changing and evolving—but the transformation we’ve seen in the past two months is unparalleled. In a matter of weeks, hundreds of millions of people around the world have had to make the shift to remote work and companies have had to migrate their business operations and offerings online. Times like these…

What Is SOC Compliance?

SOC is a set of standards that allow companies to demonstrate they are managing and regulating information properly. SOC stands for “service and organization controls;” developed by the American Institute of Certified Public Accountants (AICPA), these regulations exist to give companies peace of mind when exchanging customer data with third-party…

Founders in Focus: Jody Shapiro of Productiv

Each month, we chat with a founder of a company in the Okta Ventures portfolio for our Founders in Focus series to take a closer look at the companies at the cutting edge of security, identity, and privacy. This month, we’re hearing from Jody Shapiro, founder and CEO at Productiv. What is Productiv and what is your mission? Productiv is an…

What Is Spear Phishing?

Spear phishing is a form of cyber attack targeted at a particular person or small set of individuals. In these scams, bad actors research their chosen targets and attempt to convince them to surrender sensitive data or financial information. Spear phishing attacks may also aim to infect user devices with malware, allowing attackers to steal the…

Okta One-Minute Case Study: Emerson

"How did you do it so fast?" According to Matt Freeman, senior manager of identity management at Emerson, this was the most common question he received from Emerson leadership once they’d completed their largest transition to a Hybrid IT environment. In a move toward modernization, this Fortune 500 company decided that their Office 365 solution…

What Is Data Theft?

Data theft is the act of stealing information stored on corporate databases, devices, and servers. This form of corporate theft is a significant risk for businesses of all sizes and can originate both inside and outside an organization. The term data theft can give the impression that this kind of breach is based on malicious intent, but this is…

Archive

Follow Us