API Security in the Wild

“[Company] suffers data breach, millions of customer affected” Everybody has seen this headline multiple times. Most recently, it was T-Mobile, but in the last three years that has also been Instagram, Facebook, Tinder, Air Canada, Panera, the IRS, and the most devastating of all, Equifax. Those are just the ones we know about. Luckily, the T…

Okta Partner Connect: Leading Companies to the Cloud

The world is becoming increasingly cloud-centric and mobile, and to remain both secure and successful during this shift, companies need to have the best resources at their disposal. Arming companies for this transition isn’t a simple task, but with over 5,500 integrations, Okta is uniquely positioned to equip organizations of every size and…

Is Authentication Without a Password Secure?

Usernames and passwords have long been the standard when it comes to authentication, but it’s become very clear that this approach to security is fundamentally broken. The good news? Modern authentication technologies are making it possible to secure access in new ways and finally leave passwords behind. MFA leads the way The secret to doing away…

One-Minute Webinar: IAM + MFA Insights from ESG + Okta

Too busy to watch the ESG + Okta Webinar: How Identity Fits Into a Security-First Approach? Don’t worry. We’ve got you covered. IT analyst firm Enterprise Strategy Group (ESG) recently conducted a study into identity and access management, and the challenges presented by the cloud and mobile computing wave. Spoiler alert: Identity can reduce…

Bringing it All Together: Okta, HR, and Your Directories

In any organization, there’s one key resource that cannot be replaced: people. Even though technology is seen as the great business enabler of the 21st century, organizations must still focus their efforts on managing their human resources. After all, it’s people who are responsible for thinking creatively, generating new products, solving…

A Brief History of Zero Trust Security

The Forrester Zero Trust model, which has been around since 2009, argues that organizations should regard all network traffic as untrusted, regardless of where it’s coming from. The idea of a trusted internal perimeter leaves the organization at risk if that perimeter is compromised or an insider turns malicious. Of course, the situation has…

Hacking Achievement, Unlocked

HackerOne was started by hackers and security leaders who are driven by a passion to make the Internet safer. They partner with the global hacker community to surface the most relevant security issues before they can be exploited by criminals. HackerOne hosts live-hacking events around the world throughout the year. One of the largest of these, h1…

Archive

Follow Us
Share on Linkedin Share on Youtube