Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organisations concerned about ease and security of access, the following articles should explain why.

Secure User Identities in Your Zoom Calls — Authenticated by Okta

Today’s workforce is dynamic with employees working from the office, home, and other remote locations across the world. For organisations, Zoom has increasingly become the de facto solution for video conferencing, connecting them to employees and customers. But the shift to remote and hybrid work has left IT and security teams with a new challenge…

Why You Can’t Have Zero Trust Security Without Identity

Surging cybercrime is a major concern for every organisation today. As employee expectations for more flexible working continue to grow, IT and Security leaders face immense pressures to protect their hybrid workforce as they move beyond the traditional network perimeter. Yet, with cyberattacks having risen by 50% in the last year alone, 61% of…

Zero Trust in Europe: Special Considerations in an Evolving Regulatory Climate

In this blog we explore some of the special regulatory considerations organisations should understand when adopting a Zero Trust strategy in Europe. As enterprise technology ecosystems evolve to include a growing number of cloud resources, mobile and employee-owned devices, and digital business processes, the traditional approaches to securing…

What is the Role of IAM in Cloud Computing?

The post-Covid-19 business world doesn’t work without cloud computing, and cloud computing doesn’t work without IAM.  As the world reacted to the global pandemic back in 2020, organisations turned to technology to enable their workforce and respond rapidly to changing customer demands. Digital transformation roadmaps, originally plotted over…

What is Ransomware-as-a-Service (RaaS)?

In this post we briefly explore the emerging threat of Ransomware-as-a-Service (RaaS) and suggest how you can protect your organisation. As reports of ransomware attacks on vulnerable IT networks continue to rise, it seems as though cybercriminals are working harder than ever before. In 2020 alone, companies across the UK reported 5.9 million new…

Identity is Breaking the Shackles of Legacy IT in UK Government

This post will explore the key IT and security challenges that arise when modernising public sector infrastructure and what Okta can do to help solve them.  The COVID-19 pandemic has forced many UK public sector organisations to accelerate their digital transformation plans. In the wake of restrictions and social distancing measures, public…

How Can Organisations Protect Themselves From The Ransomware Pandemic?

Ransomware isn't new. The security frameworks to defend against the chains of attack leading to compromise aren’t new either.  To understand how best to defend against ransomware, we must understand ransomware itself: the economics, the motivation, the tactics, techniques and procedures (TTPs) as well as the changing landscape of the past 18…

Security or Useability: Overcoming the CISO Paradox

Among the longstanding challenges that information security leaders have grappled with for years, one stands out: the difficulty of balancing user experience and security. The traditional tug-of-war between ease of access to business-critical applications and resources and robust protection from hackers has never been easy.  Until now.  The…

3 Ways IAM Can Help Organisations Establish a Future Ready Hybrid IT Environment

IT transformation over the past 15 months has reminded me of Mel Brook’s 1987 sci-fi parody movie ‘Spaceballs’. Stay with me here… In Spaceballs, our heroes escape the evil ‘Dark Helmet’ (gloriously portrayed by Rick Moranis) by fleeing his clutches at lightspeed.  Our bumbling villain has but one choice...he must chase after them at ‘ludicrous…

Archive