Leading Companies Are Adopting Zero Trust—Here’s How

Let’s go back in time a few years. Businesses operate largely within the boundaries of their office walls, and security networks function under the premise that there are ‘trusted’ internal users, and ‘untrusted’ external ones. Now, as more employees than ever are accessing their corporate resources remotely, with their own devices, this premise…

To Secure DevOps, We Need to Shift Identity Left

You know it, we know it: DevOps is a core function for any company that wants to deliver exceptional digital products to its customers. But as customers become used to rapid updates and new features from the applications they use every day, there’s an added pressure for your DevOps team to be continually innovating so that your business can do the…

COVID-19 Technology Trends Through Our Partners

The COVID-19 pandemic has created unprecedented challenges for organizations around the world, especially within industries like Healthcare, Finance, and Government. In addition to being customer-centric, Okta is also a company built on partners. Many of our Solution Provider partners, especially, are working closely with our joint customers to…

Okta’s New CSO on Preparing for the Future

We often talk about how the enterprise is changing and evolving—but the transformation we’ve seen in the past two months is unparalleled. In a matter of weeks, hundreds of millions of people around the world have had to make the shift to remote work and companies have had to migrate their business operations and offerings online. Times like these…

Founders in Focus: Jody Shapiro of Productiv

Each month, we chat with a founder of a company in the Okta Ventures portfolio for our Founders in Focus series to take a closer look at the companies at the cutting edge of security, identity, and privacy. This month, we’re hearing from Jody Shapiro, founder and CEO at Productiv. What is Productiv and what is your mission? Productiv is an…

What Is Spear Phishing?

Spear phishing is a form of cyber attack targeted at a particular person or small set of individuals. In these scams, bad actors research their chosen targets and attempt to convince them to surrender sensitive data or financial information. Spear phishing attacks may also aim to infect user devices with malware, allowing attackers to steal the…

Okta One-Minute Case Study: Emerson

"How did you do it so fast?" According to Matt Freeman, senior manager of identity management at Emerson, this was the most common question he received from Emerson leadership once they’d completed their largest transition to a Hybrid IT environment. In a move toward modernization, this Fortune 500 company decided that their Office 365 solution…

Archive

Follow Us
Share on Linkedin Share on Youtube