Financial technology (fintech) is one of the hottest categories of tech, and a major disruptor in banking and financial services. Billion-dollar valuation companies such as Stripe, Sofi and Square are competing with traditional financial institutions, and winning. And while these old-world companies have been taken by surprise, they are adapting…
The announcement that Broadcom and CA have entered an agreement for Broadcom to acquire CA and the subsequent cancellation of CA World raises questions for many companies with CA Siteminder deployments. While Okta doesn’t claim to be a 1-for-1 replacement for CA Siteminder, many organizations are betting their futures on Okta and bringing their…
The Zero Trust security framework was first developed by John Kindervag in 2009 while he was at Forrester Research. Zero Trust challenged the traditional security model of a firewall forming a perimeter between a trusted internal network and an untrusted external one. This security approach breaks down if a threat actor is able to penetrate that…
Data is the new oil—an observation not lost on hackers. In a world of growing interconnectivity, our most valuable digital assets—including our digital identities–have never been so exposed. After all, attackers of the digital age now simply log in, using stolen credentials to gain access to protected documents and privileged information. Relying…
While many organizations are moving to the cloud, the reality is this: most use a hybrid environment, and many of their on-premises components aren’t going anywhere soon. Examples of such hybrid components include virtual private networks (VPNs) and/or virtual desktop infrastructures (VDIs), which enable remote access to company resources…
We know that the cloud is fast becoming the main hub of business and commerce in today's world. Yet many financial services firms have been lagging behind when it comes to adopting cloud technologies. As Nasdaq CIO Bradley Peterson points out, today's cloud systems are actually more secure than the majority of company firewalls.
Many of these…
Ever received an email from Okta or attended an Okta-hosted event in EMEA? Chances are Myriah Thompson, regional marketing manager at Okta, was behind it. Myriah is responsible for creating demand through strategic programs throughout the EMEA region. Read on to see how she does it and get a peek into #lifeatOkta in our London office!
How did you…
The most critical security threats facing enterprises today are attacks targeted at user credentials. The average number of credential theft incidents has tripled over the past two years, and today, 81% of all hacking-related breaches leverage either stolen and/or weak passwords. Using passwords alone as a means of defense for organizations simply…
The Lightweight Directory Access Protocol (LDAP) is an internet protocol that enterprise programs such as email, CRM, and HR software use to authenticate access and find information from a server. It is open, vendor-neutral, well supported, and flexible enough for storing information on internal and external users alike. Because of its scalability…
“[Company] suffers data breach, millions of customer affected”
Everybody has seen this headline multiple times. Most recently, it was T-Mobile, but in the last three years that has also been Instagram, Facebook, Tinder, Air Canada, Panera, the IRS, and the most devastating of all, Equifax. Those are just the ones we know about. Luckily, the T…