Top White Papers and Webcasts

  • From consumer wearable devices to industrial machines and heavy machineries, connected things can signal their environment, be remotely monitored, controlled – and increasingly, make decisions and take actions on their own.   Unlock the full potential of Internet of Things (IoT) with artificial intelligence (AI). The real value happens when devices learn from their specific use and from each other. It happens when devices can adapt, change behavior over time and tune their responses based on …

  • Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few.   Office 365 uses several authentication methods and access protocols, but some of their authentication methods and legacy authentication protocols do not support MFA in their authentication flow. Attackers know this and commonly abuse these vulnerabilities to …