Security is in

Today marks the release of our fourth annual Businesses @ Work Report, which takes an in-depth look at the apps and services employees, partners, contractors and customers in the Okta network use to be productive. This year, one thing is for sure: companies aren’t just adopting the best technologies, they’re securing them. 

Blockchain, virtualization and the rise of AI

2017 has been an interesting year for cyber security. With hacks still dominating the headlines and GDPR looming the spotlight has been firmly on the cyber-security industry to help consumers and businesses alike stay secure in an increasingly digital world. With 2018 round the corner, the spotlight is set to stay firmly on the security space, with Dan Panesar, VP EMEA at Certes Networks predicting that blockchain, the rise of virtualization and threat of AI will dominate conversations.

2017 data breaches point to weak machine identity protection

This was a banner year for mega data breaches; according to Gemalto’s Breach Level Index, over 900 data breaches occurred during the first half of 2017, which compromised 1.9 billion records. More data was stolen in the first six months of 2017 than the entirety of 2016. According to experts at security market leader Venafi, this massive exfiltration of data is a critical symptom of weak machine identity protection.

Sophisticated cyber threats are biggest technology fear for financial and public sector in 2018

The financial services industry and public sector are aligned in their concerns about data and system security, with both citing a fear of harmful cyber threats emerging in 2018, according to a new study from digital workplace provider Invotra.

50 percent of organisations did not disclose data breaches to customers

According to a new CyberArk survey, half of organisations (50 percent) did not fully inform customers when their personal data was compromised in a cyber attack. With enforcement of the General Data Protection Regulation (GDPR) anticipated for May 2018, organisations that do not take action to improve transparency associated with breaches will face substantial consequences.

Connected successfully