security

The Impact of Quantum Computing on Cybersecurity

Quantum computing is a fast-emerging area of computer science that is upending the foundations of cybersecurity. It’s set to change how we secure our everyday communications, process credit cards, store data, and securely connect to websites. But it’s also likely to disrupt modern security as we know it. What is quantum computing? Conventional…

Increase Business Agility by Reducing Your AD Footprint

When NASA re-engineered the space shuttle, they were heavily constrained by the size of the rocket boosters attached to it. These boosters were manufactured by an outside company and shipped by train, and thus limited by the size of American trains. U.S. train tracks were designed based on train tracks in the U.K., which were based on the old…

There’s No Place for Passwords in the Future of Work

Everyone has probably had this experience at some point: you set up an account for a work application—and the next time you need to use it, you’ve forgotten the complex password the application required. For today’s workforce, the erosion of trust in technology starts with the unreliability of a system designed to protect our identities: passwords…

How Okta and Netskope Delivered on BMC’s Cloud Security Strategy

For more than 20 years, I’ve been handling cybersecurity at BMC. I’ve got a lot of bumps and bruises to show for it, but I’ve also had the pleasure of seeing Okta and Netskope work together to help us build out an identity-first cloud security. As one of the largest software companies in the US, BMC faced a huge challenge when we moved to the…

Defending Against Identity Attacks Today and Tomorrow

Anyone who’s ever had their account hacked knows firsthand just how vulnerable our digital identities can be. But having our identities jeopardized doesn’t have to be our fate. Instead, users can take a future-proof approach to protecting themselves from the onslaught of costly identity attacks—both in their personal and professional environments…

The Production Line: Automations

  For our second edition of The Production Line, we’re going back to the future with Automations. Introduced in February of 2019, this Early Availability (EA) feature is currently the most popular EA selection since we added self-enablement options for super admins, so let’s dig in! What are Automations? The Automations feature impacts three areas…

Beyond Your Borders: How to Securely Work with Your Partners and Contractors

Not too long ago, most—if not all—business operations were conducted on premises, behind the safety of a firewall, and on devices managed by the company. Though it may not have seemed like it back then, those were simpler times. Today, it’s common for modern enterprises to work with a variety of users from outside the network. These users are…

How Okta Lifecycle Management Can Help with Audit and Compliance

At Okta, we run compliance differently. Most organizations place compliance under either the legal or finance team, who don’t work with their security team to ensure those controls are implemented effectively. At Okta, we use security to drive compliance. Compliance is complex and regulations are a moving target, with GDPR and other privacy…

How Uber Takes Advantage of the API Economy

You’ve probably heard about APIs and the API economy, and how they’re changing the way that applications are built. Companies like Uber and Airbnb that utilize 3rd party APIs extensively throughout their products have achieved a world class customer experience while being able to scale considerably fast. Focus on your strengths At the practical…

Archive