Posted on
in Presentations
Mobile authenticator apps have become the overwhelming favorite of organizations to supposedly improve the integrity of digital identities. Unfortunately, most organizations have not paid attention to the importance of mobile device hygiene to really assure the integrity of those authenticator applications. Come see a demo of how easy it is to compromise mobile authenticator apps.
Pre-Requisites: Understanding of mobile operating system basics, knowledge of how MFA systems work.
Pre-Requisites: Understanding of mobile operating system basics, knowledge of how MFA systems work.
Policy & Government Mobile & IoT Security Identity
mobile security identity management & governance unmanaged devices authentication
Topic
Policy & Government
Mobile & IoT Security
Identity
Subtopic
mobile security
identity management & governance
unmanaged devices
authentication
Share With Your Community