InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Attacker in the Middle - How MFA is Bypassed

Presented by

Joshua Gonzales, Cybersecurity Enthusiast

About this talk

Joshua from Beyond Identity takes us through Attacker in the Middle attacks against MFA, also known as Man in the Middle Attacks. As a result of these attacks on MFA, CISA’s new guidance emphasizes the need for phishing-resistant MFA, that does not utilize phishable factors like passwords, one-time codes, SMS, or email links. Follow Beyond Identity: https://twitter.com/beyondidentity https://www.linkedin.com/company/beyond-identity-inc/ Website: https://www.beyondidentity.com/
Beyond Identity

Beyond Identity

955 subscribers27 talks
Zero Trust Authentication
Zero Trust Authentication protecting your workforce, customers, and developers with passwordless, phishing-resistant MFA! www.beyondidentity.com
Related topics