
Season 5 · Episode 5
Authentication as a Key Step. We Don't Need No Stinkin' Passwords
Overkill Security · Overkill Security
September 8, 20243m 46s
Audio is streamed directly from the publisher (api.mave.digital) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
This part explains how cyber actors use stolen access tokens and other authentication methods to bypass traditional password-based security measures in cloud environments.