Over the past few months, most of us have begun to return to our usual activities. We’re heading back to the office, going out for lunch with colleagues, and boarding planes. But it’s certainly not business as usual. According to a recent McKinsey Global Survey of executives, the pandemic has accelerated corporate adoption of digital products by…
Australia’s Customer Data Right (CDR) is a set of rules and obligations that give consumers greater control over their own data. While the banking industry was first to be subject to the CDR, the energy sector is now making the move.
The Government says Open Energy, the energy sector's branding for the CDR, will help consumers find and switch to…
In today’s threat landscape, a good security posture is needed to protect your business and your customers from potential cyberattacks. But when you’re on a shoestring budget, that’s easier said than done. So how can you get a good security posture without having to dedicate much of your already limited resources?
Here are a few points to consider…
Protecting sensitive data by having the right security controls in place is of the utmost importance to every organisation. The number of data breaches around the world continues to rise with cybercriminals’ techniques evolving and becoming more sophisticated. In line with that evolution, Australia is implementing new regulations and standards to…
Okta's Digital Identity Forum Asia is happening on October 6th and explores the role that identity plays in helping companies harness digital identity to transform and scale their businesses. I’m so excited to play a part in this gathering of thought leaders. Ahead of the event, here’s a preview of my thoughts on the topic of decentralised…
There were several reasons I chose to join Okta five months ago. Back in 2010, I witnessed Okta’s founders Todd McKinnon and Frederic Kerrest gamble on a forward-thinking idea for cloud identity. Since then, Identity-as-a-Service has become a massive category that includes customer identity, workforce identity, and machine identity. Identity today…
Organisations across every industry are facilitating an exponential rise in new app creation and usage. This increase is making centralised access management increasingly costly and complex. Okta has always featured specific admin roles to meet these needs, spanning from “mobile admin” and “report admin” roles, to the global “Okta super admin”…
MFA stands for multi-factor authentication, an identity verification method. MFA adds an extra layer of security on top of credentials like usernames and passwords. By doing so, it provides greater certainty that a user is who they claim to be before granting them access to an application, online account, or corporate network.
MFA is a critical…
Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network.
Think of your most recent login…
Australian government agencies will soon be expected to apply multi-factor authentication (MFA) to the digital services they provide to the Australian public, as part of a substantive overhaul to the ACSC’s Essential Eight Maturity Model.
The Essential Eight is a set of priority controls agencies are expected to implement to mitigate cyber…