One-Minute Webinar: IAM + MFA Insights from ESG + Okta

Too busy to watch the ESG + Okta Webinar: How Identity Fits Into a Security-First Approach? Don’t worry. We’ve got you covered. IT analyst firm Enterprise Strategy Group (ESG) recently conducted a study into identity and access management, and the challenges presented by the cloud and mobile computing wave. Spoiler alert: Identity can reduce…

Bringing it All Together: Okta, HR, and Your Directories

In any organization, there’s one key resource that cannot be replaced: people. Even though technology is seen as the great business enabler of the 21st century, organizations must still focus their efforts on managing their human resources. After all, it’s people who are responsible for thinking creatively, generating new products, solving…

A Brief History of Zero Trust Security

The Forrester Zero Trust model, which has been around since 2009, argues that organizations should regard all network traffic as untrusted, regardless of where it’s coming from. The idea of a trusted internal perimeter leaves the organization at risk if that perimeter is compromised or an insider turns malicious. Of course, the situation has…

Hacking Achievement, Unlocked

HackerOne was started by hackers and security leaders who are driven by a passion to make the Internet safer. They partner with the global hacker community to surface the most relevant security issues before they can be exploited by criminals. HackerOne hosts live-hacking events around the world throughout the year. One of the largest of these, h1…

Women@Okta Talk Women in Tech Sales

Women@Okta (W@Okta) recently launched a new program called W@Okta Talks, where Okta employees have the opportunity to present on the topic of their choice, and have so far included topics such as productivity and career growth. For our August event, we organized a panel focused on women in tech sales (watch the panel here). We invited external…

The Inside Job: When Microsoft MFA Fails

In today’s threat landscape, cybersecurity vulnerabilities can originate from a variety of places. An exploitable gap in one vendor’s technology can have serious, cascading repercussions across an entire organization, large or small. This reality is one of the reasons that Okta’s Research and Exploitation (REX) team constantly performs security…

The Top Four Business Trends That IT Teams Must Address

In a world driven by digital disruption, several tech trends are shaping the business landscape of tomorrow. Business leaders have a choice: put into practice strategies that reap the benefits of these new innovations or get left behind. These are four of the most critical trends that business leaders need to consider. The four business trends you…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube