
Sign up to save your podcasts
Or
Episode 0x1D -- Oops, We Did It Again
Sometimes, breaches happen to the nicest folks
A PSA on TFA!
TFA is addictive, a year ago I started using it at work and then I began using it at home on my webmail. I didn't tell my wife about it for a while because I thought that it would bring up the whole 'if you love me you'll share you password' argument again. My TFA use began to spread to other cloud services and soon I was trying to get other people to start using it as well. Now I do TFA everywhere, whenever I have a quiet moment to access a cloud service. Sometimes I'll even use it on the train when I go to work, I don't care who sees me key in my OTP because I know TFA will keep me safe; it's a good feeling.
And if you've got commentary, please sent it to [email protected] for us to check out.
DISCLAIMER: It's not that explicit, but you may want to use headphones if you're at work.
ADDITIONAL DISCLAIMER: In case it is unclear, this is the story of 5 opinionated infosec pros who have sufficient opinions of their own they don't need to speak for anyone except themselves. Ok? Good.
In this episode:
Gentlemen,
Where did you guys get the term "Narcasistic vulnerability pimps"?
Jonesy, GTA
Creative Commons license: BY-NC-SA
4.8
1313 ratings
Episode 0x1D -- Oops, We Did It Again
Sometimes, breaches happen to the nicest folks
A PSA on TFA!
TFA is addictive, a year ago I started using it at work and then I began using it at home on my webmail. I didn't tell my wife about it for a while because I thought that it would bring up the whole 'if you love me you'll share you password' argument again. My TFA use began to spread to other cloud services and soon I was trying to get other people to start using it as well. Now I do TFA everywhere, whenever I have a quiet moment to access a cloud service. Sometimes I'll even use it on the train when I go to work, I don't care who sees me key in my OTP because I know TFA will keep me safe; it's a good feeling.
And if you've got commentary, please sent it to [email protected] for us to check out.
DISCLAIMER: It's not that explicit, but you may want to use headphones if you're at work.
ADDITIONAL DISCLAIMER: In case it is unclear, this is the story of 5 opinionated infosec pros who have sufficient opinions of their own they don't need to speak for anyone except themselves. Ok? Good.
In this episode:
Gentlemen,
Where did you guys get the term "Narcasistic vulnerability pimps"?
Jonesy, GTA
Creative Commons license: BY-NC-SA