Is Establishing a Robust IAM Practice Tactical or Strategic?

Verizon’s 2021 Data Breach Investigations Report found that privilege abuse is still the leading cause of breaches today. As cyber-attacks targeting identity (such as business email compromise or phishing) have become more sophisticated and numerous, many organizations are increasing their focus and budgets to combat them using Identity and Access…

Cyber Security Advocate: Meet Chris Niggel

As the ongoing dialogue on threats, standards, and best practices continues to drive awareness of cyber security issues, we noticed something slipping under the radar: the contributions of security professionals working behind the scenes to stay ahead of the curve. To us, cyber security means people, and we’re celebrating the Cyber Security…

Okta Is Proud to Participate in the New CrowdXDR Alliance

October is Cyber Security Awareness Month, and the past few weeks have accelerated this awareness into mainstream consciousness. Facebook experienced an outage, Twitch suffered a major data breach, and Syniverse quietly revealed a 5-year data breach. It has become starkly evident that organizations need to invest in cyber security solutions, but…

Cyber Security Advocate: Meet Annybell Villarroel

As the ongoing dialogue on threats, standards, and best practices continues to drive awareness of cyber security issues, we noticed something slipping under the radar: the contributions of security professionals working behind the scenes to stay ahead of the curve. To us, cyber security means people, and we’re celebrating the Cyber Security…

Cyber Security Advocates: Meet Jameeka Green Aaron

As the ongoing dialogue on threats, standards, and best practices continues to drive awareness of cyber security issues, we noticed something slipping under the radar: the contributions of security professionals working behind the scenes to stay ahead of the curve. To us, cyber security means people, and we’re celebrating the Cyber Security…

Advocates for Change for Cyber Security Awareness Month

The pandemic has prompted massive changes. Over the past 18 months, we’ve adapted and adjusted, implemented new processes and tools, and are acclimating to a “new normal.” While we’ve embraced an entirely new way to work, there is also a spotlight on how to do so securely. But the prevalence of vulnerabilities, exploits, and breaches is not new…