data protection

Why Okta is Privacy-Forward

Last week Okta celebrated Data Privacy Week with a company-wide campaign to reinforce employee awareness of the importance of respecting privacy and safeguarding personal data. This got me thinking about how data protection and privacy have never been more relevant to individuals around the world. We’ve never spent more time online or been so…

Founders in Focus: Simon Taylor, Founder and CEO, HYCU 

Each month we’ll highlight one of the founders of Okta Ventures’ portfolio companies. You’ll get to know more about them and learn how they work with Okta. This month we’re speaking with Simon Taylor, Founder, and CEO of HYCU.  What is HYCU, and what is your mission?  HYCU is the world’s fastest-growing Data Protection as a Service company, with…

Securing Data Across APAC: Achieving APEC PRP Certification

At Okta, trust and transparency are core to who we are as a company. These values critically inform the way we view our responsibilities to our customers and to the personal data of their users that they entrust to Okta. The keystone of our transparency is providing our customers with a clear understanding of how we collect, process, and secure…

AI Is Changing Security—Here’s How

Cybercriminals have evolved from lone hackers targeting small websites and systems into dangerous entities launching large-scale cyberattacks that affect millions of people worldwide. In recent years, we’ve seen multiple huge ransomware attacks like WannaCry and NotPetya cause hudereds of millions or even billions of dollars in damages and lost…

3 Data Breach Myths Debunked

As the ever-shifting security and threat landscape continues to evolve, it can be tough to distinguish security fact from fiction. Some common data breach misconceptions can seriously misinform your organization’s security strategy. In this post, we’ll touch on three of the most common data breach myths, and share some information on why they don…

Using SIEM and Identity to Protect Against Data Breaches

“We are what we repeatedly do“ is a common paraphrase of Aristotle—though if he were around today, his sentiment might be more like “we are what we search, click, or connect to.” As security professionals well know, there’s a lot to learn from how we use technology. The interactions between users, applications, networks, devices, and APIs all…

Your Official Guide to DEF CON Threats

As the head of security for DEF CON, I’ve seen a lot of articles (and a bit of scaremongering) around the threats at the event. While DEF CON is a technically hostile environment, I promise, it is not a dystopian wasteland. A little common sense goes a LONG way. Here’s your basic guide for how to stay safe: Don’t bring your work devices. Use…

How Okta Helps You Comply with PCI-DSS 3.2

As organizations continue to move critical services into the cloud, having strong, centralized identity becomes the foundation of a holistic security strategy. Continuing our efforts to support customers who use Okta to protect Cardholder Data Environments, we are pleased to announce that Okta has released a PCI-DSS Attestation of Compliance (AOC)…

Archive