Industry Insight

Industry Insight

To Secure DevOps, We Need to Shift Identity Left

You know it, we know it: DevOps is a core function for any company that wants to deliver exceptional digital products to its customers. But as customers become used to rapid updates and new features from the applications they use every day, there’s an added pressure for your DevOps team to be continually innovating so that your business can do the…

What Is Spear Phishing?

Spear phishing is a form of cyber attack targeted at a particular person or small set of individuals. In these scams, bad actors research their chosen targets and attempt to convince them to surrender sensitive data or financial information. Spear phishing attacks may also aim to infect user devices with malware, allowing attackers to steal the…

What Is Data Theft?

Data theft is the act of stealing information stored on corporate databases, devices, and servers. This form of corporate theft is a significant risk for businesses of all sizes and can originate both inside and outside an organisation. The term data theft can give the impression that this kind of breach is based on malicious intent, but this is…

What Is Data Misuse?

Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements. Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when…

What Is a Data Breach?

A data breach happens when cybercriminals gain unauthorised access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…

What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

FACT OR FICTION: SSO Is the Same as a Password Manager

    At Okta, we are highly invested in the latest ideas and practises around authentication and security—and that requires some myth busting. This blog is the first in a series of posts meant to tackle common misunderstandings and myths around Single Sign On. See below for our full list of the myths we've seen (and busted!) around SSO. Single…

Archive