Risky Business cover image

Wide World of Cyber: How state adversaries attack security vendors

Risky Business

00:00

Navigating the Complexities of Cloud Authentication and Identity Management

This chapter explores the vulnerabilities in cloud authentication and identity management, focusing on the shortcomings of identity providers and SaaS solutions. It highlights the risks of cookie theft and the necessity for enhanced security measures in internal authentication.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner