Featured

MFA Stops Credential Theft? - Cybersecurity Mythbusters
Patrick McBride and Jasson Casey at Beyond Identity
Most credentials are some form of symmetric, or shared secret (like passwords). The problem is that a shared secret must be shared and transmitted between a client and a server. Application load balancers, proxies, and content distribution networks ensure that these secrets touch the memory of many machines between the client and the server.
If any of these machines were to become compromised, the shared secrets it contains are also compromised. Users can also unknowingly or unwittingly divulge the shared secret.
Preventing credential theft requires the realization that the movement of the credential is bad. Every time the credential moves, it increases the surface area that must be protected.
If a credential never moved, it would have a surface area the size of its host computer.
Asymmetric cryptography provides the technical means of creating unmovable credentials. Create an asymmetric key pair, share the public key, don’t move the private key, and sign challenges with your private key. This is a simple mechanism that chips away at the problem.
Join Beyond Identity's CMO, Patrick McBride, and CTO, Jasson Casey, as they, joined by KnowBe4's Roger Grimes, try to bust this latest myth!
Follow Beyond Identity:
twitter.com/beyondidentity
linkedin.com/company/beyond-identity-inc
Website:
beyondidentity.com
All episodes
-
Does MFA Stop 99% of Attacks? - Cybersecurity Mythbusters
Patrick McBride and Jasson Casey at Beyond Identity
Microsoft said that MFA stops 99% of attacks. Is this really true?
We hear all the time to implement MFA, but when it comes to all the options, which one is best? Luckily we have Roger Grimes (KnowBe4), Author of Hacking Multifactor Authentication, with us to help us out!
Join Beyond Identity's CMO, Patrick McBride, and CTO, Jasson Casey, as they try to bust this latest myth!
Follow Beyond Identity:
https://twitter.com/beyondidentity
https://www.linkedin.com/company/beyond-identity-inc/Website:
https://www.beyondidentity.com/ -
TPMs Can't Be Hacked - Cybersecurity Mythbusters
Patrick McBride and Jasson Casey at Beyond Identity
A TPM (or Trusted Platform Module) is an industry standard component that protects keys that can be used for authentication.
The important property of TPMs is that the private key is protected from even the lowest level of the operating system. This property protects a TPM key from phishing and other attacks that may expose it. It is available on most PCs, networking equipment, and industrial controllers.
But can a TPM be hacked? Our Security Architect, Monty Wiseman is with us to help us find out!
Join Beyond Identity's CMO, Patrick McBride, and CTO, Jasson Casey, as they try to bust this latest myth!
Follow Beyond Identity:
twitter.com/beyondidentity
linkedin.com/company/beyond-identity-incWebsite:
beyondidentity.com -
MFA Stops Credential Theft? - Cybersecurity Mythbusters
Patrick McBride and Jasson Casey at Beyond Identity
Most credentials are some form of symmetric, or shared secret (like passwords). The problem is that a shared secret must be shared and transmitted between a client and a server. Application load balancers, proxies, and content distribution networks ensure that these secrets touch the memory of many machines between the client and the server.
If any of these machines were to become compromised, the shared secrets it contains are also compromised. Users can also unknowingly or unwittingly divulge the shared secret.
Preventing credential theft requires the realization that the movement of the credential is bad. Every time the credential moves, it increases the surface area that must be protected.
If a credential never moved, it would have a surface area the size of its host computer.
Asymmetric cryptography provides the technical means of creating unmovable credentials. Create an asymmetric key pair, share the public key, don’t move the private key, and sign challenges with your private key. This is a simple mechanism that chips away at the problem.
Join Beyond Identity's CMO, Patrick McBride, and CTO, Jasson Casey, as they, joined by KnowBe4's Roger Grimes, try to bust this latest myth!
Follow Beyond Identity:
twitter.com/beyondidentity
linkedin.com/company/beyond-identity-incWebsite:
beyondidentity.com