
Sign up to save your podcasts
Or


We return to discussions of OAuth and all sorts of authentication. This time around we're looking at the design of authentication protocols, the kinds of trade-offs they weigh for adoption and security, and how a standard evolves over time to keep pace with new attacks and put to rest old mistakes.
Segment resources:
Show Notes: https://securityweekly.com/asw-260
By Security Weekly Productions4.8
44 ratings
We return to discussions of OAuth and all sorts of authentication. This time around we're looking at the design of authentication protocols, the kinds of trade-offs they weigh for adoption and security, and how a standard evolves over time to keep pace with new attacks and put to rest old mistakes.
Segment resources:
Show Notes: https://securityweekly.com/asw-260

7,608 Listeners

373 Listeners

268 Listeners

374 Listeners

655 Listeners

1,023 Listeners

8,041 Listeners

181 Listeners

182 Listeners

315 Listeners

74 Listeners

57 Listeners

138 Listeners

41 Listeners

44 Listeners