Breach, Please!

Beyond Passwords: Evolving Authentication in Cybersecurity


Listen Later

This episode discusses the evolution of authentication methods, from simple passwords to advanced techniques like MFA and passkeys. It highlights the persistent threat of compromised credentials in cyberattacks, emphasizing the motivations of attackers (financial gain, espionage, disruption). The text details various authentication methods (passwords, MFA, biometrics, SSO, certificate-based, passkeys), their strengths, weaknesses, and ideal use cases. Furthermore, it examines recent high-profile attacks exploiting authentication vulnerabilities (APT29, Lapsus$, Scattered Spider) and provides mitigation strategies, including robust MFA, strong password practices, regular software updates, user education, and continuous monitoring. Finally, it emphasizes the need for a multi-layered approach to authentication to counter evolving threats.

...more
View all episodesView all episodes
Download on the App Store

Breach, Please!By Callie Guenther, Senior Manager - Cyber Threat Research at Critical Start