Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Yaser Masoudnia, the Senior Director Product Management, Identity Access Management, at LogMeIn* takes us there.
Sponsors
Episode 168: Application Security Debt is growing. Also: Web App Security in the Age of IoT
In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt. Also, Brendan Macaraeg of Signal Sciences talks about the expanding landscape of web application attacks and defenses.
Explained: Two-Factor vs. Multi-Factor Authentication
It may seem like two-factor authentication and multi-factor authentication are the same. They’re not, explains Yaser Masoudnia, the Senior Director of Product Management at LastPass.*
Spotlight Podcast: Breaking Bad Password Habits to Fight Advanced Threats
In this Spotlight edition of the Security Ledger podcast, Rachel Stockton of LastPass * joins us to discuss the myriad of challenges facing companies trying to secure users’ online activities, and simple solutions for busting insecure user behaviors to address threats like phishing, account takeover and more.
NotPetya Horror Story Highlights Need for Holistic Security
The NotPetya malware’s ability to cripple even sophisticated, global firms is a cautionary tale about the need for businesses to understand their risk and take a holistic view of security says Fadi Albatal, Chief Strategy Officer at Hitachi Systems Security.*