Top White Papers and Webcasts

  • Driven by new technologies in the classroom and the proliferation of mobile devices and digital content, K-12 schools and districts report their networks are being stretched — a trend that might continue as more schools explore emerging technologies such as smart transit and the Internet of Things (IoT). To identify network technology needs and priorities for K-12 education, the Center for Digital Education (CDE) surveyed K-12 IT employees and K-12 network professionals. Read this research report to …

  • Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few.   Office 365 uses several authentication methods and access protocols, but some of their authentication methods and legacy authentication protocols do not support MFA in their authentication flow. Attackers know this and commonly abuse these vulnerabilities to …