article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. Once inside the system, the hacker gained access to files uploaded by Okta customers using valid session tokens from recent support cases.

article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. The firm had seen continuous patterns of activity that showed that bad actors tried to get passwords to privileged user accounts. According to reports, MGM and Caesars were both customers of identity management company Okta.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LLMs Demand Observability-Driven Development

Honeycomb

Many software engineers are encountering LLMs for the very first time, while many ML engineers are being exposed directly to production systems for the very first time. Some of these things are related to cost/benefit tradeoffs, but most are about weak telemetry, instrumentation, and tooling. Latency is often unpredictable.

article thumbnail

10 digital transformation roadblocks — and 5 tips for overcoming them

CIO

Lack of vision A common reason digital transformation fails is due to a lack of vision, which along with planning is the foundation for digital success. Poor execution Even the best plans can fail if execution is poor. This may require hiring outside experts and/or investing in training and development for existing staff.

article thumbnail

Modernizing applications: the importance of reducing technical debt

CIO

As recent, widely publicized events have shown, it is a business problem that can have serious consequences for organizations. Technical debt can be defined as the accumulation of legacy systems and applications that are difficult to maintain and support, as well as poorly written or hastily implemented code that increases risk over time.

article thumbnail

Writing Useful Performance Reviews: Evaluating the data and writing the review

Puppies, Flowers, Rainbows and Kittens

This article is the second in a four-part series on writing performance reviews. In this article, I talk about filling out the review form. The final post covers delivering the review. Before you begin to write your review, make sure you have the role and level definition for the person’s current role and level.

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

These global events have also underscored the crucial significance of safeguarding our critical infrastructure against domestic or foreign attacks. As technology advances, so too does the sophistication of threats to these essential systems. The impact of these disruptions reverberated worldwide, reaching beyond just our economy.