Blog

/Blog/

Cloud Computing Security Risks Breakdown

The use of cloud services is ubiquitous—we’ve seen this rise over the past decade to the point where many of our organizations couldn’t function today without the cloud. Critical to this growth is the understanding that data, and most importantly sensitive data, now lives in the cloud and must be protected. In our last survey [...]

January 24th, 2019|Uncategorized|0 Comments

When Sharing isn’t Caring – Secure Your Cloud Collaboration

Our data lives in the cloud and nearly a quarter of it requires protection to limit our risk. However, the risk of exposure is counter to one of the key tenets of many cloud services—collaboration. Cloud storage services like Box, or productivity suites like Office 365 are used to increase the fluidity of collaboration. But [...]

January 2nd, 2019|Uncategorized|0 Comments

4 Reasons Top CISOs Trust Okta with Their Toughest Security Challenges

With Gartner predicting that 80% of companies will close their data centres completely by 2025, it’s clear that companies are embracing cloud-based infrastructure. How we work has changed; employees are increasingly mobile, and our IT environments are far more complex. As attack surfaces broaden and incidents of credential theft skyrocket, most CISOs have come to the [...]

December 27th, 2018|Uncategorized|0 Comments

Innovating Data Loss Prevention: From Device to Cloud

Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, as a way to give their end-users greater flexibility and easier access to core business applications.  This requires corporate IT departments to re-examine their current data security posture such as data loss prevention (DLP) policies to better monitor and control sensitive data [...]

December 24th, 2018|Uncategorized|0 Comments

Eight Security Capabilities You Need to Protect Your Amazon Web Services Infrastructure

The worldwide infrastructure as a service (IaaS) public cloud market grew 31 percent in 2016 to total $22.1 billion, up from $16.8 billion in 2015, and is expected to show the fastest growth over the next five years compared to platform as a service (PaaS) and software as a service (SaaS), according to Gartner. With increasing adoption of IaaS platforms, we also see [...]

November 26th, 2018|Uncategorized|0 Comments

Women Are the Future of Cloud Security

In 2017, the Women in Cybersecurity Survey Report noted that only 11% of cybersecurity jobs are held by women. Of the women that were surveyed, 50% identified gender discrimination as a reason why there are so few women in cybersecurity, while 28% stated that they didn’t feel valued at work. The survey also revealed that the overall [...]

November 22nd, 2018|Uncategorized|0 Comments

5 Key Findings from 2019 Cloud Adoption and Risk Report

Cloud services are now a vital part of corporate life, bringing a momentous opportunity to accelerate business through their ability to quickly scale, allowing us to be agile with our resources, and providing new opportunities for collaboration. The typical organization uses, on average, 1,935 cloud services spanning enterprise-ready services procured by the IT department such [...]

October 25th, 2018|Uncategorized|0 Comments

Innovating Data Loss Prevention: From Device to Cloud

Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, as a way to give their end-users greater flexibility and easier access to core business applications. This requires corporate IT departments to re-examine their current data security posture such as data loss prevention (DLP) policies to better monitor and control sensitive data [...]

October 20th, 2018|Uncategorized|0 Comments

The Evolution of Zero Trust: Next Gen Access

he Zero Trust security framework was first developed by John Kindervag in 2009 while he was at Forrester Research. Zero Trust challenged the traditional security model of a firewall forming a perimeter between a trusted internal network and an untrusted external one. This security approach breaks down if a threat actor is able to penetrate that [...]

September 26th, 2018|Uncategorized|0 Comments

When People Are the Perimeter, We Need a Zero Trust Approach to Security

Data is the new oil—an observation not lost on hackers. In a world of growing interconnectivity, our most valuable digital assets—including our digital identities–have never been so exposed. After all, attackers of the digital age now simply log in, using stolen credentials to gain access to protected documents and privileged information. Relying on usernames and [...]

September 22nd, 2018|Uncategorized|0 Comments