
Sign up to save your podcasts
Or
We return to discussions of OAuth and all sorts of authentication. This time around we're looking at the design of authentication protocols, the kinds of trade-offs they weigh for adoption and security, and how a standard evolves over time to keep pace with new attacks and put to rest old mistakes.
Segment resources:
Show Notes: https://securityweekly.com/asw-260
4.7
3535 ratings
We return to discussions of OAuth and all sorts of authentication. This time around we're looking at the design of authentication protocols, the kinds of trade-offs they weigh for adoption and security, and how a standard evolves over time to keep pace with new attacks and put to rest old mistakes.
Segment resources:
Show Notes: https://securityweekly.com/asw-260
1,963 Listeners
2,012 Listeners
361 Listeners
630 Listeners
369 Listeners
1,008 Listeners
313 Listeners
388 Listeners
7,819 Listeners
943 Listeners
162 Listeners
188 Listeners
189 Listeners
118 Listeners
33 Listeners