5 Identity Attacks That Exploit Your Broken Authentication
An Okta Report
Get an Alertwhen The Register has something new about ...
Check the boxes & select Email or Atom/RSS Feed.
Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organisations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter expands to wherever the user is logging in from.
In other words, the identity becomes the perimeter. Threat agents have recognised this as a security gap and are exploiting the natural proclivity for your employees to trust an inbound email from a familiar source, or their tendency to reuse passwords across personal and professional accounts.
You will have to register, or log in, in order to download this paper.