The Authentication Apocalypse

Remote work Infographic

Your cybersecurity experts

Lieuwe Jan Koning

Co-Founder and CTO, ON2IT

Luca Cipriano

Threat Intel Specialist, ON2IT

Rob Maas Field CTO

Harald Bosman

Senior Endpoint Engineer, AMS-IX

The Authentication Apocalypse

Word of data breaches and stolen credentials reaches the news almost every other day. If your credentials get stolen, criminals could have access to your bank accounts, health care records, company secrets and more. Needless to say, authentication is key!

In this episode Lieuwe Jan Koning, Luca Cipriano and Harald Bosman discuss the following hacks:

Interested in the full technical breakdown of the discussed threats?

Remote work Infographic

Get your Hacker T-shirt

Join the treasure hunt!

Find the code within this episode and receive your own hacker t-shirt for free.

10 + 15 =

Episode details

Every other day, we are faced with yet another news alert about data breaches and stolen credentials. If yours are amongst those, criminals could have acces to your bank accounts, health care records, company secrets, and more. Authentication is important, as it makes stealing your information harder: the harder it is to access your data, the more likely that criminals will choose someone else to target.

In the digital domain, authentication acts as the key to accessing various services, with methods ranging from Multi-Factor Authentication to password-less and biometric systems. Each approach offers a unique balance of security and convenience, sparking curiosity: Which method is the most secure? What are the trade-offs of convenience versus safety? And what does the future hold for authentication technology?

Does your company require authentication methods for signing in? For a dive into what modern-day authentication is, tune in to this episode of Threat Talks: The Authentication Apocalypse.

Subscribe to our Spotify channel and stay up to date with every cybersecurity treat.

Related Deep Dives