InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Fixing Broken Authentication: How to Address This Critical Security Risk

Presented by

Andrew Akers, Senior Marketing Manager - Solutions, Auth0

About this talk

Authentication is a mission-critical component of most applications, making it a prime target for attackers. Improperly implemented authentication, also known as broken authentication, is a widespread problem. According to the Open Web Application Security Project (OWASP), broken authentication is the second-most critical web application security risk. Broken authentication encompasses a variety of vulnerabilities related to an application’s session or credential management. These vulnerabilities allow attackers to exploit the system and impersonate legitimate users. Join this webinar to learn: - What broken authentication is - The most common causes of broken authentication - What threats exploit these vulnerabilities - How you can securely and easily implement identity
Cloud Security Alliance: CloudBytes

Cloud Security Alliance: CloudBytes

80446 subscribers1015 talks
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
Related topics