Top White Papers and Webcasts

  • On-Demand Webinar AV and NGAV have built upon the idea of stopping known problems (or at least known unknowns). With a foundation of signatures and a light framework of behaviors of observed attacks, they tout a way to stop attacks. However, a simple glance at the news shows these tools are not successful. Businesses need more to solve for the constant growing cyber security risk.   AV and NGAV alone isn’t going to protect an organization.   Nation-state adversaries are not the …

  • Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few.   Office 365 uses several authentication methods and access protocols, but some of their authentication methods and legacy authentication protocols do not support MFA in their authentication flow. Attackers know this and commonly abuse these vulnerabilities to …