Weak authentication, based on usernames and passwords, has been surrounded with timers and codes, providing only a modicum of additional protection. This can lull identity and security teams into a false confidence. Conversely, they also increase the surface area available for exploit by attackers.
In episode 3. Augments Authentication Flows of his Zero Trust Authentication Master Class, Beyond Identity CTO Jasson Casey explains these pitfalls further.
Follow Beyond Identity:
twitter.com/beyondidentity
linkedin.com/company/beyond-identity-inc
Website:
beyondidentity.com