Businesses @ Work (from Home): The Finance Edition

As the COVID-19 pandemic and shelter-in-place regulations continue to keep people at home, businesses around the world have adapted to new ways of operating—with many looking to quickly deploy solutions to keep large remote workforces connected, productive, and secure. Organizations in the banking and finance industries are no different—and with…

Businesses @ Work (from Home): The Education Edition

In the midst of the COVID-19 pandemic, people and organizations are rallying to respond to unprecedented challenges. With this massive disruption to what we consider ‘normal’, more people than ever are working and studying from the comfort of home. Within our schools and universities, teachers and students are figuring out new ways of learning,…

Adapting to the Cloud Operating Model: Using Okta + HashiCorp to Automate Identity + Infrastructure as Code

Companies who employ DevOps programs have a goal in mind – to enable velocity at scale. Getting software out the door faster and more effectively is becoming critical to remain competitive in today’s fast-paced technology landscape. When speed is the name of the game, automation is key. Without the right guard rails, however, automation can be…

Why Cloud-First Hybrid IAM is Too Important to Ignore

Although the benefits of cloud efficiencies are well-understood, most large companies recognize it’s not easy to convert thousands of apps across the enterprise to take advantage of the cloud. So, most organizations take a pragmatic approach: let’s adopt more SaaS applications where we can. Then, we’ll gradually modernize existing apps and retire…

5 Tenets of a Robust Security Infrastructure

The global number of cyber-attacks reached an all-time high last year and shows no indication of slowing down. In fact, cyber-attacks and data fraud are two of the top 10 global risks for this upcoming decade according to the World Economic Forum (WEF) Global Risk Report. The National Counterintelligence and Security Center (NCSC) recently…

How to Centrally Manage Server User Attributes With Okta

A major driver for any organization’s identity strategy is to have a single authoritative source where security policies are consistently applied. Disparate identity stores lead to disparate controls, which makes it incredibly difficult to adhere to your compliance-mandated security policies. Okta has grown to be the market leader in this space…

Archive

Follow Us
Share on Linkedin Share on Youtube