Strong Authentication Methods: Stopping the Reuse of Credentials & Session Tokens
Share
Subscribe
Discover how strong authentication methods, such as biometric and device-based verification, can prevent credential reuse and significantly improve security against cybercriminal threats.
Access credentials and session tokens are among the most popular illicit digital products in underground digital marketplaces. The reuse of credentials is often the starting point that leads to a data breach and ransomware. But tying authentication to unspoofable factors – a person’s fingerprint, a device footprint – provides a much higher level of assurance that only legitimate users are accessing systems. This strong authentication provides higher security and a better user experience.
In this video, Brett Winterford of Okta and Intel 471’s Jeremy Kirk discuss strong authentication, paths to strengthening authentication, and what Intel 471 analysts observe around credential theft in the underground cybercriminal.
Participants:
Brett Winterford, Regional Chief Security Officer, APJ, Okta
Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471
----------
Stay in Touch!
Twitter: https://twitter.com/Intel471Inc
LinkedIn: https://www.linkedin.com/company/intel-471/
YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg
Discord: https://discord.gg/DR4mcW4zBr
Facebook: https://www.facebook.com/Intel471Inc/
