Blueprint: Build the Best in Cyber Defense cover image

Strategy 5: Prioritize Incident Response

Blueprint: Build the Best in Cyber Defense

00:00

How to Avoid Token Stolen Mobile Devices

One of the things to think about for mobile as well as other for, is token stealing. People will often authenticate to their enterprise services from a mobile device. And then, thanks to persistent sessions and web browsers that we don't usually close, we're at risk of having those tokens stolen. This is opening up a lot of opportunities for those kind of phishing, what are whole type attacks for adversaries.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app