The Authentication Apocalypse
Your cybersecurity experts
Lieuwe Jan Koning
Co-Founder and CTO, ON2IT
Luca Cipriano
Threat Intel Specialist, ON2IT
Harald Bosman
Senior Endpoint Engineer, AMS-IX
The Authentication Apocalypse
Word of data breaches and stolen credentials reaches the news almost every other day. If your credentials get stolen, criminals could have access to your bank accounts, health care records, company secrets and more. Needless to say, authentication is key!
In this episode Lieuwe Jan Koning, Luca Cipriano and Harald Bosman discuss the following hacks:
Interested in the full technical breakdown of the discussed threats?
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
Episode details
Every other day, we are faced with yet another news alert about data breaches and stolen credentials. If yours are amongst those, criminals could have acces to your bank accounts, health care records, company secrets, and more. Authentication is important, as it makes stealing your information harder: the harder it is to access your data, the more likely that criminals will choose someone else to target.
In the digital domain, authentication acts as the key to accessing various services, with methods ranging from Multi-Factor Authentication to password-less and biometric systems. Each approach offers a unique balance of security and convenience, sparking curiosity: Which method is the most secure? What are the trade-offs of convenience versus safety? And what does the future hold for authentication technology?
Does your company require authentication methods for signing in? For a dive into what modern-day authentication is, tune in to this episode of Threat Talks: The Authentication Apocalypse.
Subscribe to our Spotify channel and stay up to date with every cybersecurity treat.