The Universal Privilege Management model is an expansive approach to securing your entire universe of privileges along a journey that allows you to quickly address your biggest risk areas and immediately shrink your attack surface.
Download this guide to learn an approach that will set you up for success in:
Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it's time to rethink strategy.
As our new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and...
As CISO of SoftBank Investment Advisers, Gary Hayslip is dealing with a familiar crisis management challenge: Supporting a remote workforce, with extra emphasis on secure identities. But he's also keeping a close eye on his team and the risks of burnout.
The "human factor" has become a key discussion point in the cyber security community; the humans behind both threats and security have been sorely overlooked. Even the CISO, the conductor at the head of every security team, has been an elusive figure.
Nominet interviewed 400 CISOs and 400 C-Suite executives on the...
When securing the remote workforce, it's important to be mindful of the human challenges - educating children, caring for elders and dealing with the barrage of COVID-19 news, says Microsoft's Diana Kelley, who shares insights on balancing cybersecurity and compassion.
Gartner recently recognized Okta as a Leader in the "Magic Quadrant for Access Management" for the third year in a row. Additionally, Okta has been placed highest both "Ability to Execute" and "Completeness of Vision" making us the first vendor in the report's history to do so.
Okta believes this recognition from...
Security leadership requires far more than knowing about the latest technology, says Joyce Brocaglia, founder of the Executive Women's Forum, who offers insights on how CISOs can enhance their reputations.
Organizations need to create a "defensible" cybersecurity program that has a mandate and executive endorsement, says Gartner's Tom Scholtz. I. Here are some points to keep in mind when drafting a program.
IoT, the cloud, third-party risk - we hear a lot about how the cybersecurity risk surface and threat landscape have evolved. But what about the new business demands on cybersecurity leaders? Christopher Hetner, former global CISO at GE Capital, shares insights.
The exits of the Department of Homeland Security secretary and Secret Service director are prompting discussion about the continuity of U.S. cybersecurity policy because the agencies play a key role in securing infrastructure and investigating financial cybercrime.
To enable digital transformation, security practitioners need to shift away from a traditional network-based security focus and instead develop a security policy that meets users' business requirements, says Scott Robertson, vice president, Asia Pacific and Japan, at Zscaler.