Okta recently sponsored a series of interviews with technology leaders, to discuss how they and their organisations have had to adapt to remote working; leading and succeeding through the Covid19 pandemic. Cathy Mulligan, Fujitsu’s VP & European CTO took time out from her busy schedule to discuss how her team and the wider organisation had…
Few things have thrown notions of the Future of Work and what that might look like into sharper perspective, than the current Covid19 pandemic. At Okta, we recently sponsored a series of interviews with technology leaders, to discuss how they and their organisations have had to adapt to remote working; leading and succeeding through the lockdown…
As spending in the global cybersecurity market continues to increase, so does the number of organisations, tools, professionals, products, developers, and partners offering security solutions. Even for professionals, choosing the right one can be a daunting task. That’s why IT distributor Distology takes matters into its own hands, continually…
Listening to learn is a trait I value highly. With that in mind, Okta recently sponsored a series of interviews with technology leaders, to discuss how they and their organisations have had to adapt to remote working; leading and succeeding through the Covid19 pandemic.
First up was Guy Mason, CIO at Bourne Leisure, who currently count well-known…
It’s hard to believe that only 40 years ago, the preferred data storage format was CDs, Microsoft was releasing its first version of Windows, and the Apple Macintosh was just hitting the mass-market. Against this backdrop in 1982, Bytes was founded. They emerged as an IT solutions provider to help businesses use technology to grow, adapt, and stay…
For organisations and government agencies alike, strong identity management is paramount. Millions of people share sensitive, personal information with commercial and public bodies every day, so companies and public sector agencies have a responsibility to secure their assets.
This is where ICAM and FICAM come in.
What is ICAM?
Identity,…
This is the third and final blog post in our Adapt to the Cloud Operating Model series.
With any organisational change that impacts people, process, and technology, it’s best to take it in stride. When talking with customers about their Zero Trust security initiatives, an analogy I often use is: “if Google’s BeyondCorp is the peak of Mt. Everest,…
SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…
Viruses, spyware, and other malware can affect more than just desktop computers and laptops. Mobile devices are vulnerable as well. As the threat landscape continues to evolve, it’s important that we not only understand these risks—but how we can protect ourselves against them.
In this post, we’ll take a closer look at the mobile phone security…
Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. In a Zero Trust model, people are the new perimeter, and identity is the core of maintaining a secure environment.
An evolving landscape
Historically, organisations have kept their data…