Growing the Hive: Strengthening Okta’s Security with Bugcrowd

Customer success is our number one company value at Okta. For my security team, that translates directly to customer security and assurance: continually demonstrating to customers how we keep their data safe and secure. Today, we announced another big step in how we protect our customers’ data with the launch of a public bug bounty program with…

Credentials: You Can’t Take Them With You

There is a price tag on misused credentials. This week, as Rachel King at the Wall Street Journal reports, Tata Consultancy Services’ (TCS) bill came out to $940 million. An employee at TCS was found to have used credentials from a previous contracting job at Kaiser to access more than 6,000 confidential files on Epic System’s web portal. Prior…

Navigating the New Perimeter

As corporate employees are now regularly accessing their enterprise applications and data from mobile devices and cloud applications, the traditional idea of the enterprise network boundary is vanishing. Enterprises are grappling with the reality where the network perimeter is defined by the employee identity. Securing this “Identity Perimeter”…

Thoughts from the Sony Breach

Sony has made big headlines – for all the wrong reasons – for having sensitive company data stolen and posted online in late November. (For full details, I’d recommend WIRED’s “Sony Got Hacked Hard: What We Know and Don’t Know So Far.”) The event has sparked a lot of debate as to the source of the attack and how it was achieved, with the…