5 Identity Attacks That Exploit Your Broken Authentication

An Okta Report

Published May 2019

5IdentityAttacksThatExploitYourBrokenAuthentication_Whitepaper_0

Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organisations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter expands to wherever the user is logging in from.

In other words, the identity becomes the perimeter. Threat agents have recognised this as a security gap and are exploiting the natural proclivity for your employees to trust an inbound email from a familiar source, or their tendency to reuse passwords across personal and professional accounts.

You will have to register, or log in, in order to download this paper.

Biting the hand that feeds IT © 1998–2019