Latest Articles

Anatomy of Identity-Based Attacks

As a security practitioner, protecting your organization’s data is your number one priority. Yet with the explosion of the mobile and hybrid workforce, SaaS adoption, and application modernization, new attack methodologies arise all the time. And even with a Zero Trust Architecture enforcing principles of least privilege, security teams still need proper identity and access […]

Read →

Simple and Sustainable Data Storage for Enterprise Imaging

Invest in a long-term solution from Pure Storage®. Ready to upgrade your enterprise imaging infrastructure? The ripple effect of the pandemic is still playing out, but healthcare organizations aren’t waiting around to make improvements. There’s an increased emphasis on supporting efficiency and driving productivity1—and setting a foundation for future growth and adaptability. In this follow-up to the […]

Read →

Forrester: The Definition of Modern Zero Trust

It’s been over a decade since Forrester created the Zero Trust Model of information security. Since then, marketing hype has co-opted the term, creating confusion and misunderstanding about the actual definition of Zero Trust, thus driving skepticism about its practical, real-world implementation. Read this report to get a clear, concise definition of Zero Trust. You’ll […]

Read →

State of Zero Trust Security 2022 Report

Zero Trust adoption has reached a tipping point. While the security framework has steadily gained traction over the past several years, adoption rates passed a critical threshold in 2022.  More than half of the organizations surveyed (55%) for Okta’s annual report on the framework have a Zero Trust initiative in place, and the vast majority […]

Read →

IT: The Key to Effective Work

To meaningfully track the trends impacting IT teams today and measure whether they’re keeping the workforce protected and productive, Pulse and Okta surveyed 500 IT, security, and HR professionals. Download the whitepaper to see the findings and learn how identity enables IT teams to deliver employee experiences that grow a secure, productive workforce.

Read →

An Identity-First Strategy for IT Modernization

The modernization of IT has become an exercise in doing more with less. IT teams know they need to streamline the technology stack while mitigating security threats. At the same time, empowering the workforce is one of the most critical functions of modern IT. Employees enjoy seamless digital experiences through their personal apps and now […]

Read →

CIO’s Guide to Identity Driven Optimization

Today’s CIOs are increasingly accountable for more than just enabling the organization with tools and technology. CIOs and their IT teams are being seen as strategic enablers of the front office, tasked with supporting the workforce while also generating business value. And the very best in their field are looking for innovative ways to help […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights