
Sign up to save your podcasts
Or


Summary
In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the critical topic of token theft in identity management. They discuss the importance of multi-factor authentication (MFA) as a primary defense against identity attacks, the nature of tokens, and how attackers exploit vulnerabilities to steal these tokens. The conversation highlights the introduction of token binding as a new protective measure, practical steps organizations can take to reduce the risk of token theft, and the significance of detecting and investigating potential attacks. The hosts emphasize the need for managed and compliant devices, user training, and the implementation of conditional access policies to enhance security.
----------------------------------------------------
YouTube Video Link: https://youtu.be/xPHqA7JzPkY
----------------------------------------------------
Documentation:
https://techcommunity.microsoft.com/t5/microsoft-entra-blog/how-to-break-the-token-theft-cyber-attack-chain/ba-p/4062700
----------------------------------------------------
Contact Us:
Website: https://bluesecuritypod.com
Twitter: https://twitter.com/bluesecuritypod
LinkedIn: https://www.linkedin.com/company/bluesecpod
YouTube:
https://www.youtube.com/c/BlueSecurityPodcast
-----------------------------------------------------------
Andy Jaw
Twitter: https://twitter.com/ajawzero
LinkedIn: https://www.linkedin.com/in/andyjaw/
Email: [email protected]
----------------------------------------------------
Adam Brewer
Twitter: https://twitter.com/ajbrewer
LinkedIn: https://www.linkedin.com/in/adamjbrewer/
Email: [email protected]
By Andy Jaw & Adam Brewer4.7
1515 ratings
Summary
In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the critical topic of token theft in identity management. They discuss the importance of multi-factor authentication (MFA) as a primary defense against identity attacks, the nature of tokens, and how attackers exploit vulnerabilities to steal these tokens. The conversation highlights the introduction of token binding as a new protective measure, practical steps organizations can take to reduce the risk of token theft, and the significance of detecting and investigating potential attacks. The hosts emphasize the need for managed and compliant devices, user training, and the implementation of conditional access policies to enhance security.
----------------------------------------------------
YouTube Video Link: https://youtu.be/xPHqA7JzPkY
----------------------------------------------------
Documentation:
https://techcommunity.microsoft.com/t5/microsoft-entra-blog/how-to-break-the-token-theft-cyber-attack-chain/ba-p/4062700
----------------------------------------------------
Contact Us:
Website: https://bluesecuritypod.com
Twitter: https://twitter.com/bluesecuritypod
LinkedIn: https://www.linkedin.com/company/bluesecpod
YouTube:
https://www.youtube.com/c/BlueSecurityPodcast
-----------------------------------------------------------
Andy Jaw
Twitter: https://twitter.com/ajawzero
LinkedIn: https://www.linkedin.com/in/andyjaw/
Email: [email protected]
----------------------------------------------------
Adam Brewer
Twitter: https://twitter.com/ajbrewer
LinkedIn: https://www.linkedin.com/in/adamjbrewer/
Email: [email protected]

4,803 Listeners

9,724 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

317 Listeners

66 Listeners

175 Listeners

73 Listeners

24 Listeners

139 Listeners

5 Listeners