Top White Papers and Webcasts

  • Moving toward cloud-native computing infrastructure and production environments can’t happen without radical new approaches for security automation. The automated security operations center (SOC) is an innovative security operations model that enables enterprises to secure vast, complex IT environments with smaller security teams, augmented by extensive automation. Read this guide to learn how you can take immediate, manageable actions that will make your transition to an automated SOC faster and …

  • Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few.   Office 365 uses several authentication methods and access protocols, but some of their authentication methods and legacy authentication protocols do not support MFA in their authentication flow. Attackers know this and commonly abuse these vulnerabilities to …