Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially devastating application vulnerability. In fact, the Open Web Application Security Project (OWASP) lists broken authentication as the second most critical security risk to web applications.
This session will provide:
-An overview of broken authentication;
-Why it’s so dangerous;
-The types of threats that can take advantage of this vulnerability;
-How you can prevent this most critical application security risk.
*Introduction music by: Bensounds.com