Balancing technology with pastoral care is the foundation of Dynamic Work

Okta recently sponsored a series of interviews with technology leaders, to discuss how they and their organisations have had to adapt to remote working; leading and succeeding through the Covid19 pandemic. Cathy Mulligan, Fujitsu’s VP & European CTO took time out from her busy schedule to discuss how her team and the wider organisation had…

New found working freedom requires greater security to deliver true Dynamic Work

Few things have thrown notions of the Future of Work and what that might look like into sharper perspective, than the current Covid19 pandemic. At Okta, we recently sponsored a series of interviews with technology leaders, to discuss how they and their organisations have had to adapt to remote working; leading and succeeding through the lockdown…

Trailblazing Okta distributor Distology is helping partners thrive in a fast-changing world. Here’s how:

As spending in the global cybersecurity market continues to increase, so does the number of organisations, tools, professionals, products, developers, and partners offering security solutions. Even for professionals, choosing the right one can be a daunting task. That’s why IT distributor Distology takes matters into its own hands, continually…

Leading the Leisure industry towards Dynamic Work

Listening to learn is a trait I value highly. With that in mind, Okta recently sponsored a series of interviews with technology leaders, to discuss how they and their organisations have had to adapt to remote working; leading and succeeding through the Covid19 pandemic. First up was Guy Mason, CIO at Bourne Leisure, who currently count well-known…

What Are ICAM and FICAM?

For organisations and government agencies alike, strong identity management is paramount. Millions of people share sensitive, personal information with commercial and public bodies every day, so companies and public sector agencies have a responsibility to secure their assets.  This is where ICAM and FICAM come in. What is ICAM? Identity,…

What Is SMS Authentication and Is It Secure?

SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…

What is Zero Trust Security?

Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. In a Zero Trust model, people are the new perimeter, and identity is the core of maintaining a secure environment. An evolving landscape Historically, organisations have kept their data…

What Is Identity Governance and Administration?

Identity governance and administration (IGA) is a policy-based approach to identity management and access control. As the name implies, IGA systems merge identity governance and identity administration to provide additional functionality beyond traditional identity and access management (IAM) tools. Particularly, they offer valuable support in…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube