Trailblazing Okta distributor Distology is helping partners thrive in a fast-changing world. Here’s how:

As spending in the global cybersecurity market continues to increase, so does the number of organisations, tools, professionals, products, developers, and partners offering security solutions. Even for professionals, choosing the right one can be a daunting task. That’s why IT distributor Distology takes matters into its own hands, continually…

Leading the Leisure industry towards Dynamic Work

Listening to learn is a trait I value highly. With that in mind, Okta recently sponsored a series of interviews with technology leaders, to discuss how they and their organisations have had to adapt to remote working; leading and succeeding through the Covid19 pandemic. First up was Guy Mason, CIO at Bourne Leisure, who currently count well-known…

What Are ICAM and FICAM?

For organisations and government agencies alike, strong identity management is paramount. Millions of people share sensitive, personal information with commercial and public bodies every day, so companies and public sector agencies have a responsibility to secure their assets.  This is where ICAM and FICAM come in. What is ICAM? Identity,…

What Is SMS Authentication and Is It Secure?

SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…

What is Zero Trust Security?

Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. In a Zero Trust model, people are the new perimeter, and identity is the core of maintaining a secure environment. An evolving landscape Historically, organisations have kept their data…

What Is Identity Governance and Administration?

Identity governance and administration (IGA) is a policy-based approach to identity management and access control. As the name implies, IGA systems merge identity governance and identity administration to provide additional functionality beyond traditional identity and access management (IAM) tools. Particularly, they offer valuable support in…

What Is Vishing?

Vishing (or “voice phishing”) is a type of social engineering scam where an attacker tries to trick their target into surrendering sensitive data over the phone.  As with other social engineering attacks, these phone phishing scams prey upon human emotions—attackers often create false scenarios that cause panic (e.g., security alerts) or desire (e…

Archive

Follow Us
Share on Linkedin Share on Youtube