security

There’s No Place for Passwords in the Future of Work

Everyone has probably had this experience at some point: you set up an account for a work application—and the next time you need to use it, you’ve forgotten the complex password the application required. For today’s workforce, the erosion of trust in technology starts with the unreliability of a system designed to protect our identities: passwords…

How Okta and Netskope Delivered on BMC’s Cloud Security Strategy

For more than 20 years, I’ve been handling cybersecurity at BMC. I’ve got a lot of bumps and bruises to show for it, but I’ve also had the pleasure of seeing Okta and Netskope work together to help us build out an identity-first cloud security. As one of the largest software companies in the US, BMC faced a huge challenge when we moved to the…

Defending Against Identity Attacks Today and Tomorrow

Anyone who’s ever had their account hacked knows firsthand just how vulnerable our digital identities can be. But having our identities jeopardized doesn’t have to be our fate. Instead, users can take a future-proof approach to protecting themselves from the onslaught of costly identity attacks—both in their personal and professional environments…

The Production Line: Automations

  For our second edition of The Production Line, we’re going back to the future with Automations. Introduced in February of 2019, this Early Availability (EA) feature is currently the most popular EA selection since we added self-enablement options for super admins, so let’s dig in! What are Automations? The Automations feature impacts three areas…

Beyond Your Borders: How to Securely Work with Your Partners and Contractors

Not too long ago, most—if not all—business operations were conducted on premises, behind the safety of a firewall, and on devices managed by the company. Though it may not have seemed like it back then, those were simpler times. Today, it’s common for modern enterprises to work with a variety of users from outside the network. These users are…

How Okta Lifecycle Management Can Help with Audit and Compliance

At Okta, we run compliance differently. Most organizations place compliance under either the legal or finance team, who don’t work with their security team to ensure those controls are implemented effectively. At Okta, we use security to drive compliance. Compliance is complex and regulations are a moving target, with GDPR and other privacy…

How Uber Takes Advantage of the API Economy

You’ve probably heard about APIs and the API economy, and how they’re changing the way that applications are built. Companies like Uber and Airbnb that utilize 3rd party APIs extensively throughout their products have achieved a world class customer experience while being able to scale considerably fast. Focus on your strengths At the practical…

Why I joined Okta as their Chief Product Officer

After 15 years of experience leading product development for some of the largest companies in the world, I’m excited to share that I’ve recently joined Okta as their Chief Product Officer. Identity continues to play an increasingly important role in our modern digital lives, and I’m thrilled to lead Okta’s product innovation as we work to enable a…

Prevent Large-Scale Identity Attacks with Okta ThreatInsight

In today’s tech landscape, the importance of securing user logins has become a no-brainer. We’re constantly seeing reports of data breaches as a result of identity attacks, and we know those threat actors aren’t going anywhere. According to the 2018 Verizon Data Breach Investigation Report, stolen credentials are still the #1 culprit in confirmed…

Archive