InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

5 Identity Attacks that Exploit Your Broken Authentication

Presented by

Teju Shyamsundar, Okta, Sr. Product Marketing Manager

About this talk

It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users. While two-factor authentication solutions have been around for a while, they're no longer comprehensive enough to defend the new perimeter. Join us to learn the anatomy of common identity attacks, and how to keep hackers out of your organization. We’ll discuss: - Identity attacks that exploit insecure methods of authentication - How to add a smart layer of security over your critical apps, services, and devices - What to look for in a multi-factor authentication solution
Cloud Security Alliance: CloudBytes

Cloud Security Alliance: CloudBytes

80670 subscribers1017 talks
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
Related topics