5 Identity Attacks that Exploit Your Broken Authentication

Logo
Presented by

Teju Shyamsundar, Okta, Sr. Product Marketing Manager

About this talk

It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users. While two-factor authentication solutions have been around for a while, they're no longer comprehensive enough to defend the new perimeter. Join us to learn the anatomy of common identity attacks, and how to keep hackers out of your organization. We’ll discuss: - Identity attacks that exploit insecure methods of authentication - How to add a smart layer of security over your critical apps, services, and devices - What to look for in a multi-factor authentication solution
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (901)
Subscribers (65575)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa