How Okta simplifies NIS2 compliance: a deep dive

The newly updated NIS2 Directive marks a significant turning point in Europe’s fight against cybercrime. When organisations adhere to these regulations, they can reduce the risk of data leaks, safeguard sensitive information, and ensure the security of critical IT systems. Failure to comply, however, can lead to devastating financial penalties…

Your on-the-go audio guide to Customer Identity is here.

60 books a year. Five books a week. 50 pages a day. That’s how much the average business leader is supposed to read [1] – and while it may not seem all that much on paper, the truth is that many of us (non-business leaders included) simply don’t have enough time in the day. After we’ve driven, worked, walked the dog, cooked, and cleaned, lying in…

How Can You Optimise Hybrid Working in Your Organisation?

It’s no longer new, it’s no longer trendy, and it’s no longer temporary. In Europe, hybrid work is here to stay. As the dust settles in the aftermath of the short-term crisis period provoked by the outbreak of the COVID-19 pandemic. It’s becoming increasingly clear that widespread adoption of flexible and hybrid working models will be part of the…

5 Key Lessons from The Okta Hybrid Work Report 2023

Yes, that’s right - another report speculating about the future of work! And before you say anything I can assure you, we have seen all of the buzzwords and trends in the press too: The introduction of the four-day-work week  The proliferation of AI and automation tools  The mass installation of executive hammocks in offices to support corporate…

Identity’s role in helping you achieve your ESG goals

Environmental, Social, and Governance (ESG) is a framework that every forward-thinking business must follow. By achieving ESG goals, organisations can attract more investors, secure customer trust, improve employee wellbeing, and create the sustainable workplaces of today and tomorrow – but what role does identity play in helping them on that…

Zero Trust in Europe: Special Considerations in an Evolving Regulatory Climate

In this blog we explore some of the special regulatory considerations organisations should understand when adopting a Zero Trust strategy in Europe. As enterprise technology ecosystems evolve to include a growing number of cloud resources, mobile and employee-owned devices, and digital business processes, the traditional approaches to securing…

Security & User Experience: No More Compromises

No one enjoys making compromises. Yet, when it comes to developing new experiences for their customers, product teams are often forced to make trade-offs between security and user experience. This dilemma is fuelled by the evolving expectations of consumers. With brands like Amazon and AirBnB leading the way in digital experience, customers now…

Why Loginless is the Future of Authentication

It’s often said that familiarity breeds contempt. But psychological research reveals quite the opposite: the more people are exposed to something, the more they tend to like it — and the more likely they are to believe that it’s trustworthy and safe. This phenomenon may explain the persistence of the traditional username/password login box, which…

Introducing the CIAM Maturity Framework

Customers’ standards are getting higher. Accustomed to smooth Amazon-style web experiences, we now expect the same seamlessness from every organisation we interact with online. Clunky digital experiences with complicated logins and endless data requests are an inconvenience we don’t need – and can easily prompt us to abandon our baskets entirely. …

Introducing the Hybrid Work Maturity Framework

The world of work has changed forever. The shift to remote working during COVID has proven that, given the right access to the right systems, we can work just as productively outside the office as inside it. At the same time, it’s given many of us a taste of freedom we’re reluctant to give up. To retain the brightest and best talent in the future,…