Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organisations concerned about ease and security of access, the following articles should explain why.

What is the Role of IAM in Cloud Computing?

The post-Covid-19 business world doesn’t work without cloud computing, and cloud computing doesn’t work without IAM.  As the world reacted to the global pandemic back in 2020, organisations turned to technology to enable their workforce and respond rapidly to changing customer demands. Digital transformation roadmaps, originally plotted over…

What is Ransomware-as-a-Service (RaaS)?

In this post we briefly explore the emerging threat of Ransomware-as-a-Service (RaaS) and suggest how you can protect your organisation. As reports of ransomware attacks on vulnerable IT networks continue to rise, it seems as though cybercriminals are working harder than ever before. In 2020 alone, companies across the UK reported 5.9 million new…

Identity is Breaking the Shackles of Legacy IT in UK Government

This post will explore the key IT and security challenges that arise when modernising public sector infrastructure and what Okta can do to help solve them.  The COVID-19 pandemic has forced many UK public sector organisations to accelerate their digital transformation plans. In the wake of restrictions and social distancing measures, public…

How Can Organisations Protect Themselves From The Ransomware Pandemic?

Ransomware isn't new. The security frameworks to defend against the chains of attack leading to compromise aren’t new either.  To understand how best to defend against ransomware, we must understand ransomware itself: the economics, the motivation, the tactics, techniques and procedures (TTPs) as well as the changing landscape of the past 18…

Security or Useability: Overcoming the CISO Paradox

Among the longstanding challenges that information security leaders have grappled with for years, one stands out: the difficulty of balancing user experience and security. The traditional tug-of-war between ease of access to business-critical applications and resources and robust protection from hackers has never been easy.  Until now.  The…

3 Ways IAM Can Help Organisations Establish a Future Ready Hybrid IT Environment

IT transformation over the past 15 months has reminded me of Mel Brook’s 1987 sci-fi parody movie ‘Spaceballs’. Stay with me here… In Spaceballs, our heroes escape the evil ‘Dark Helmet’ (gloriously portrayed by Rick Moranis) by fleeing his clutches at lightspeed.  Our bumbling villain has but one choice...he must chase after them at ‘ludicrous…

Protecting Your Organisation From the Cyber Threat Gold Rush

It has been a tough year for information security teams. COVID-19 has completely redefined the cyber threat landscape and added brand new levels of complexity to an already demanding discipline.  Organisations have had to rapidly adopt new technologies to enable remote working and scale-up digital touch points with customers. This has, at times,…

Securing the Future Workplace With Identity

How can you maintain security when employees work remotely? Nothing about this pandemic has been normal. As the COVID-19 virus swept across the globe disrupting everything and everyone in its path, people’s lives changed in a dramatic fashion, both personally and professionally. Global restrictions on movement and human-to-human contact forced…

Identity is the Key Enabler for Building Digital Trust in the New Workplace

How can business leaders build trust in remote teams? Over the past year, the global shift to remote work has changed the way we live and completely transformed the way organisations view productivity and collaboration. Where work was once defined almost exclusively within the physical realm of the office, business leaders must now navigate the…

5 Key Takeaways from Our 2021 State of Zero Trust Security Report

How important is it to implement Zero Trust? We asked over 600 business and security leaders across North America, Asia Pacific (APAC), Europe, the Middle East, and Africa (EMEA)—and the overwhelming consensus is that it has become crucial. With the unprecedented shift to remote work, the adoption of new digital products and services, and the…

Archive