Smashing Security cover image

Jail after VPN fail, criminal messaging apps, and wolf-crying watches

Smashing Security

00:00

Identifying the Gaps in MFA and Multi-Factor Use

The first stage is really to identify your gaps. What you really need is like an annoying person who's going to go and ask everyone a lot of questions. So where are these users? What computers are they using? It's continuously asking these questions. And once you have that picture, really then the second stage is working out what is the best factor for these people. That sort of continues monitoring, that continuous controlling of how people operate. We provide 15 different factors that people only think they need one.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app