Top White Papers and Webcasts

  • Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few.   Office 365 uses several authentication methods and access protocols, but some of their authentication methods and legacy authentication protocols do not support MFA in their authentication flow. Attackers know this and commonly abuse these vulnerabilities to …

  • More business applications, including advanced analytics, are moving to cloud-based platforms. Advantages include agility, innovation and a cost-effective way to gain high performance. But many cloud migrations fail to gain all these potential benefits.   In this paper, SAS and the International Institute for Analytics (IIA) explore how to maximize the performance and value of analytics in the cloud, weigh the options, and choose the right approach to migration.