Artwork

محتوای ارائه شده توسط Tech Field Day. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Tech Field Day یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

64. We Are Long Past Passwords

33:41
 
اشتراک گذاری
 

Manage episode 491899314 series 1204875
محتوای ارائه شده توسط Tech Field Day. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Tech Field Day یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Passwords have served their use in the enterprise. We need to start moving away from simple passwords as an authentication mechanism. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by Tony Efantis, Karen Lopez, and Fernando Montenegro as they discuss the premise that we are long past passwords, exploring the complexities and frustrations of relying on them for myriad online accounts. The conversation highlights the concept of economic externalities, where developers easily implement simple passwords, but the burden of managing hundreds of unique credentials falls on the individual user. While passwords were initially designed for basic authentication, there has been a shift towards alternative mechanisms like one-time codes sent to email or passkeys because of user laziness and the security risks associated with password reuse and compromised credentials. Ultimately, what is needed a balanced, risk-based authentication approach is necessary, tailoring security levels to the sensitivity of the data being protected, and leveraging technologies like biometrics and background risk assessments to create a more convenient and secure user experience, even as attackers continue to evolve their methods.

Panelists:

Fernando Montenegro, VP and Practice Leader, Cybersecurity Research at The Futurum Group

Karen Lopez, Data Security Expert

Tony Efantis, Network Security Expert

Follow the Tech Field Day Podcast ⁠⁠⁠⁠⁠on X/Twitter⁠⁠⁠⁠⁠ or ⁠⁠⁠⁠⁠on Bluesky⁠⁠⁠⁠⁠ and use the Hashtag #TFDPodcast to join the discussion. Listen to more episodes ⁠⁠⁠⁠⁠on the podcast page of the website⁠⁠⁠⁠⁠.

Follow ⁠⁠⁠⁠⁠Tech Field Day⁠⁠⁠⁠⁠ for more information on upcoming and current event coverage ⁠⁠⁠⁠⁠on X/Twitter⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠on Bluesky⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠on LinkedIn⁠⁠⁠⁠⁠, or ⁠⁠⁠⁠⁠visit our website⁠⁠⁠⁠⁠.

  continue reading

326 قسمت

Artwork

64. We Are Long Past Passwords

Tech Field Day Podcast

28 subscribers

published

iconاشتراک گذاری
 
Manage episode 491899314 series 1204875
محتوای ارائه شده توسط Tech Field Day. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Tech Field Day یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Passwords have served their use in the enterprise. We need to start moving away from simple passwords as an authentication mechanism. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by Tony Efantis, Karen Lopez, and Fernando Montenegro as they discuss the premise that we are long past passwords, exploring the complexities and frustrations of relying on them for myriad online accounts. The conversation highlights the concept of economic externalities, where developers easily implement simple passwords, but the burden of managing hundreds of unique credentials falls on the individual user. While passwords were initially designed for basic authentication, there has been a shift towards alternative mechanisms like one-time codes sent to email or passkeys because of user laziness and the security risks associated with password reuse and compromised credentials. Ultimately, what is needed a balanced, risk-based authentication approach is necessary, tailoring security levels to the sensitivity of the data being protected, and leveraging technologies like biometrics and background risk assessments to create a more convenient and secure user experience, even as attackers continue to evolve their methods.

Panelists:

Fernando Montenegro, VP and Practice Leader, Cybersecurity Research at The Futurum Group

Karen Lopez, Data Security Expert

Tony Efantis, Network Security Expert

Follow the Tech Field Day Podcast ⁠⁠⁠⁠⁠on X/Twitter⁠⁠⁠⁠⁠ or ⁠⁠⁠⁠⁠on Bluesky⁠⁠⁠⁠⁠ and use the Hashtag #TFDPodcast to join the discussion. Listen to more episodes ⁠⁠⁠⁠⁠on the podcast page of the website⁠⁠⁠⁠⁠.

Follow ⁠⁠⁠⁠⁠Tech Field Day⁠⁠⁠⁠⁠ for more information on upcoming and current event coverage ⁠⁠⁠⁠⁠on X/Twitter⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠on Bluesky⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠on LinkedIn⁠⁠⁠⁠⁠, or ⁠⁠⁠⁠⁠visit our website⁠⁠⁠⁠⁠.

  continue reading

326 قسمت

כל הפרקים

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش