security

Okta’s New CSO on Preparing for the Future

We often talk about how the enterprise is changing and evolving—but the transformation we’ve seen in the past two months is unparalleled. In a matter of weeks, hundreds of millions of people around the world have had to make the shift to remote work and companies have had to migrate their business operations and offerings online. Times like these…

How to Manage Linux Identities Without LDAP

A common configuration for on-premises Linux servers includes using an LDAP directory to manage identities and for user authentication. This approach has been a de-facto standard and best practice for more than a decade. But LDAP directories have posed challenges to administrators and security professionals. There is a better way to manage Linux…

5 Tenets of a Robust Security Infrastructure

The global number of cyber-attacks reached an all-time high last year and shows no indication of slowing down. In fact, cyber-attacks and data fraud are two of the top 10 global risks for this upcoming decade according to the World Economic Forum (WEF) Global Risk Report. The National Counterintelligence and Security Center (NCSC) recently…

Three Trends that Will Help You Navigate Today’s Security Landscape

It’s no secret that we’re experiencing a dramatic shift in the way we conduct business, the way we manage our workforce, and the way we interact with our customers. As companies worldwide respond to the unprecedented effects of COVID-19, we’ve seen these changes play out in how organizations accommodate both their employees and their customers…

Building Consumer Trust: 4 Challenges to Offering Secure User Authentication

No brand can be successful without customer trust. But as organizations handle and store more customer data than ever—data that’s increasingly targeted by cyber criminals—that trust is harder to earn and even harder to keep. In my previous post, I discussed the various stages of the customer journey that are crucial to building and retaining user…

The Secret Features of Okta Access Gateway: Part 3: Maintenance Mode

At Okta, we love to secure access to everything, from cloud apps, to consumer apps, to servers, and infrastructure—from a single platform. And that, of course, includes on-premises apps. In our new series The Secret Features of Okta Access Gateway, we’re going to explore some of the best secret features of Okta Access Gateway (OAG) to secure…

The Secret Features of Okta Access Gateway: Part 2: On-Prem Data Sources

At Okta, we love to secure access to everything, from cloud apps, to consumer apps, to servers, and infrastructure—from a single platform. And that, of course, includes on-premises apps. In our new series The Secret Features of Okta Access Gateway, we’re going to explore some of the best secret features of Okta Access Gateway (OAG) to secure…

3 On-Prem Security Myths Debunked

As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it. This trend applies to both…

Archive