9 Steps to Create a Security Program on a Budget

The past 18 months have been particularly lucrative for  cyber criminals with phishing and ransomware attacks leading to some high profile breaches impacting the likes of SolarWinds, Microsoft Exchange, the Colonial Pipeline, and Accenture. In today’s threat landscape, a good security posture is needed to protect your business and your customers…

How Okta Helps the Royal Belgian Football Association Match a Golden Generation With a Golden Fan Experience

Today’s blog post comes from Koen Landsheere, IT Manager at the Royal Belgian Football Association (RBFA), Belgium’s governing federation of football. By integrating Okta across customer and workforce identity environments, the RBFA elevated the fan experience with a single, personalised customer portal for all football needs, while strengthening…

How Three Brands Are Using IAM to Enable Secure Remote & Hybrid Working

In the early days of the COVID-19 pandemic, workers worldwide found themselves improvising workspaces at home, hopeful that we would soon “go back to normal”. But as 2022 approaches, forward-thinking business leaders have shifted their focus from a return to the pre-pandemic ways of working to a new, more flexible approach. They aim to build…

The Next Marathon: Spreading Trust in a Digital World

We are delighted to welcome Jon Addison as our new Senior Vice President, EMEA General Manager. In this post he shares his observations on the growing importance of identity when creating digital experiences and the role Okta has to play as a key enabler of digital trust. After arguably the most chaotic and disruptive 18 months in modern human…

How Okta Elite Partner, Upright Security, Supports Customers in Every Step of Their Identity Journey

Securing access to digital assets has never been more important. In our increasingly connected, cloud-powered world, propelled into a new age of remote access by COVID-19, businesses can’t afford not to make identity and access management (IAM) a priority. But even for experienced businesses, implementing the right IAM tools in the right way can…

How Can Organisations Protect Themselves From The Ransomware Pandemic?

Ransomware isn't new. The security frameworks to defend against the chains of attack leading to compromise aren’t new either.  To understand how best to defend against ransomware, we must understand ransomware itself: the economics, the motivation, the tactics, techniques and procedures (TTPs) as well as the changing landscape of the past 18…

Security or Useability: Overcoming the CISO Paradox

Among the longstanding challenges that information security leaders have grappled with for years, one stands out: the difficulty of balancing user experience and security. The traditional tug-of-war between ease of access to business-critical applications and resources and robust protection from hackers has never been easy.  Until now.  The…

Still Unsure About Your Remote Work Policy? If You Love Your Employees, Set Them Free

The way we work has changed forever. Even prior to the outbreak of the COVID-19 pandemic in 2020, employees in a wide variety of roles and industries sought greater autonomy and flexibility in their work experiences. An alarmingly large percentage of workers reported feeling disengaged or unhappy in the workplace. According to global aggregate…

A Long-Term Strategy for Hybrid and Dynamic Work

The events of 2020 — including office closures in the wake of the global COVID-19 pandemic and the subsequent shift to remote work that they necessitated — were unexpected and unprecedented. Confronting such unfamiliar circumstances, most organisations had to improvise. By and large, the remote work strategies created in response to the pandemic…

Archive

Follow Us
Share on Linkedin Share on Youtube