What Is Privileged Access Management?

Privileged access management (PAM) is a way of authorising, managing, and monitoring account access with a high degree of administrative permissions. This is done to protect an organisation’s most critical systems and resources. These “super user” accounts are isolated within an encrypted repository or vault. The access of these systems is…

What Is Data Misuse?

Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements. Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when…

What is a One-Time Password (OTP)?

A one-time password or passcode (OTP) is a string of characters or numbers that authenticates a user for a single login attempt or transaction. One-time passwords are created by an algorithm, that generates a unique value for each OTP by factoring in contextual information, like time-based data or previous login events. Tech support teams…

What Is a Data Breach?

A data breach happens when cybercriminals gain unauthorised access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…

What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

Why the future of work in Europe is dynamic

Having lived in Denmark, Germany and the UK, I consider myself a “true European”. I’ve observed subtle differences in the working cultures of each country so was intrigued to see the results of our recent Okta YouGov research of 6,000 office workers across the UK, Germany, France and the Netherlands. Given the backdrop of COVID-19, there is…

Adapting to the Cloud Operating Model: Using Okta + HashiCorp to Automate Identity + Infrastructure as Code

Companies who employ DevOps programs have a goal in mind – to enable velocity at scale. Getting software out the door faster and more effectively is becoming critical to remain competitive in today’s fast-paced technology landscape. When speed is the name of the game, automation is key. Without the right guard rails, however, automation can be…

Adopting a Remote Work Strategy? We’re Here to Help

Nothing is more important to us than the health and safety of our community, and we know many organisations feel the same. In response to the continuously developing COVID-19 crisis, we’re seeing companies all over the world take various steps to help protect their employees. For Okta and several other organisations, part of this strategy includes…

Archive

Follow Us
Share on Linkedin Share on Youtube