First generation, password-based MFA generates an attack surface area in motion and every device remains an attack surface at rest.
In this episode, Rebuilding Authentication for Zero Trust, Jasson walks through how utilizing encryption and employing asymmetric cryptography can eliminate the in motion attack surface and minimize that at rest vulnerability.
Follow Beyond Identity:
twitter.com/beyondidentity
linkedin.com/company/beyond-identity-inc
Website:
beyondidentity.com