We will discuss failure modes of advanced authentication and show exploit bypasses of multifactor auth systems. From there, we will provide pragmatic means for defense of credential systems, including normalizing credential defense, baselines, credential reset engineering, and architecture of a "credential firewall" so that network firewalls aren't bypassed by unsafe credential practices.
Hackers & Threats Identity Risk Management & Governance
authentication hackers & threats identity management & governance password management practitioner perspectives
Share With Your Community