SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Solving Problems with
Authentication
Yo Sub Kwon
Co-founder of Launchkey
Attacks
• Compromised credentials of a privileged account
• Direct access to cloud servers or hardware containing wallets or
credentials
• Compromised credentials on a mass scale of users with weak or
shared passwords
• Weak or compromised API keys
• Trojans and Keyloggers
• Bitcoin specialized malicious software
Kill Passwords
Along with many in
the industry, we feel
passwords and
simple bearer tokens
such as cookies are
no longer sufficient
to keep users safe
-Google Vice
President of Security
Eric Grosse
Using passwords for security
is no longer safe for people
-Jonathan LeBlanc, PayPal’s
head of global developer
advocacy
FIDO hopes to make passwords a
thing of the past
-Kayvan Alikhani, senior director of
technology at RSA
Passwords are insecure
• They’re inherently susceptible to brute-force attacks
• They are typically stored in-band on servers (and elsewhere) while a
knowledge factor of authentication is only effective so long as the
individual retains sole possession of that secret.
• They’re susceptible to human error by both the individuals that utilize
passwords and the developers that implement them
• Cracking hashed passwords becomes progressively easier with our
ever increasing computing power
• Due to password re-use, one password breach can result in obtaining
credentials for multiple unrelated services
Common Patches
• Minimum password requirements
• Password expirations
• More passwords
• One time passwords (OTP) as a second factor
• Social Media logins
Problems
• Passwords are insecure
• Multifactor authentication is technically complex
• Out of band hardware is costly
• New authentication measures can be disruptive to business
Solutions – Passwords are insecure
• Remove passwords
• Authentication using mobile devices (BYOD)
• Biometric authentication
• Physical devices such as USB keys or wearables
Solutions - Multifactor complexity
• Decentralize the layer of authentication
• Don’t do your own security
• Fidoalliance.org
Solutions – Disruptive to business
• Offer multiple options to login
• Passive factors of authentication
Conclusions
• Better security doesn’t need to be more difficult
• Placing patches on authentication problems is not future-proof
• Better security and easier to use authentication solutions do exist
Encourage the services you use to offer them for their sake and yours

Contenu connexe

Tendances

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1Mike Stone
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Vikash Lalsing (CITP)
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
IoT Product development Meetup
IoT Product development MeetupIoT Product development Meetup
IoT Product development MeetupItai Voller
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code ReviewsDenim Group
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
 
Enterprise Collaboration - 4
Enterprise Collaboration - 4Enterprise Collaboration - 4
Enterprise Collaboration - 4Nitin Kohli
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessWindham Brannon
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurationsPeter Hewer
 

Tendances (20)

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
IoT Product development Meetup
IoT Product development MeetupIoT Product development Meetup
IoT Product development Meetup
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
Enterprise Collaboration - 4
Enterprise Collaboration - 4Enterprise Collaboration - 4
Enterprise Collaboration - 4
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for Success
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
 

En vedette

Bitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondBitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondMecklerMedia
 
Steve beauregard keynote
Steve beauregard keynoteSteve beauregard keynote
Steve beauregard keynoteMecklerMedia
 
Buy and Sell By paymium
Buy and Sell By paymiumBuy and Sell By paymium
Buy and Sell By paymiumLaFrenchMobile
 
Pdf guerrilla marketing
Pdf guerrilla marketingPdf guerrilla marketing
Pdf guerrilla marketingMecklerMedia
 
Bitcoin Payment Focus
Bitcoin Payment Focus Bitcoin Payment Focus
Bitcoin Payment Focus MecklerMedia
 
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
Inside 3 d printing   metamoderism, leslie oliver karpas (save small)Inside 3 d printing   metamoderism, leslie oliver karpas (save small)
Inside 3 d printing metamoderism, leslie oliver karpas (save small)MecklerMedia
 
151021 metamason 10 page competition pitch
151021   metamason 10 page competition pitch151021   metamason 10 page competition pitch
151021 metamason 10 page competition pitchMecklerMedia
 
Bitcoin Past Present Future
Bitcoin Past Present FutureBitcoin Past Present Future
Bitcoin Past Present FutureMecklerMedia
 
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...Vidal Chriqui
 
A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)MecklerMedia
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesMecklerMedia
 
Cloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingCloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingMecklerMedia
 
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)FrancisPouliot
 
Les Alternatives à la Blockchain
Les Alternatives à la BlockchainLes Alternatives à la Blockchain
Les Alternatives à la BlockchainCyril Grunspan
 

En vedette (15)

Bitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondBitcoin, Blockchain & Beyond
Bitcoin, Blockchain & Beyond
 
Steve beauregard keynote
Steve beauregard keynoteSteve beauregard keynote
Steve beauregard keynote
 
Buy and Sell By paymium
Buy and Sell By paymiumBuy and Sell By paymium
Buy and Sell By paymium
 
Pdf guerrilla marketing
Pdf guerrilla marketingPdf guerrilla marketing
Pdf guerrilla marketing
 
Bitcoin Payment Focus
Bitcoin Payment Focus Bitcoin Payment Focus
Bitcoin Payment Focus
 
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
Inside 3 d printing   metamoderism, leslie oliver karpas (save small)Inside 3 d printing   metamoderism, leslie oliver karpas (save small)
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
 
151021 metamason 10 page competition pitch
151021   metamason 10 page competition pitch151021   metamason 10 page competition pitch
151021 metamason 10 page competition pitch
 
Bitcoin Past Present Future
Bitcoin Past Present FutureBitcoin Past Present Future
Bitcoin Past Present Future
 
The Cognitive Era
The Cognitive EraThe Cognitive Era
The Cognitive Era
 
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
 
A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
 
Cloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingCloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printing
 
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
 
Les Alternatives à la Blockchain
Les Alternatives à la BlockchainLes Alternatives à la Blockchain
Les Alternatives à la Blockchain
 

Similaire à Solving problems with authentication

Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsGabriella Davis
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_designNCC Group
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityNet at Work
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudNeelkamal Gaharwar
 

Similaire à Solving problems with authentication (20)

Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration Solutions
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
A Better Method of Authentication
A Better Method of AuthenticationA Better Method of Authentication
A Better Method of Authentication
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
 

Plus de MecklerMedia

Global Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookGlobal Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Why Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseWhy Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseMecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldMecklerMedia
 
Building a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoBuilding a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoMecklerMedia
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleMecklerMedia
 
Inside 3 d printing 2015
Inside 3 d printing 2015Inside 3 d printing 2015
Inside 3 d printing 2015MecklerMedia
 
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...MecklerMedia
 
Designing for the dmls process oct2015
Designing for the dmls process oct2015Designing for the dmls process oct2015
Designing for the dmls process oct2015MecklerMedia
 
Inside 3 d printing presentation lisa
Inside 3 d printing presentation lisaInside 3 d printing presentation lisa
Inside 3 d printing presentation lisaMecklerMedia
 
Inside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamInside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamMecklerMedia
 
Efesto presentation kunal varma
Efesto presentation  kunal varmaEfesto presentation  kunal varma
Efesto presentation kunal varmaMecklerMedia
 
Infra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideInfra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideMecklerMedia
 
V rin construction-7
V rin construction-7V rin construction-7
V rin construction-7MecklerMedia
 
I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2MecklerMedia
 
I3 dp 2015_cricket-labs
I3 dp 2015_cricket-labsI3 dp 2015_cricket-labs
I3 dp 2015_cricket-labsMecklerMedia
 
Inside bitcoins chicago short
Inside bitcoins chicago shortInside bitcoins chicago short
Inside bitcoins chicago shortMecklerMedia
 
Bitcoin Speculation
Bitcoin SpeculationBitcoin Speculation
Bitcoin SpeculationMecklerMedia
 

Plus de MecklerMedia (19)

Global Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookGlobal Capital Markets & Industry Outlook
Global Capital Markets & Industry Outlook
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Why Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseWhy Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to Increase
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Building a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoBuilding a Robotics Hub in San Diego
Building a Robotics Hub in San Diego
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical People
 
Inside 3 d printing 2015
Inside 3 d printing 2015Inside 3 d printing 2015
Inside 3 d printing 2015
 
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
 
Designing for the dmls process oct2015
Designing for the dmls process oct2015Designing for the dmls process oct2015
Designing for the dmls process oct2015
 
Inside 3 d printing presentation lisa
Inside 3 d printing presentation lisaInside 3 d printing presentation lisa
Inside 3 d printing presentation lisa
 
Inside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamInside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranpham
 
Efesto presentation kunal varma
Efesto presentation  kunal varmaEfesto presentation  kunal varma
Efesto presentation kunal varma
 
Infra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideInfra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslide
 
V rin construction-7
V rin construction-7V rin construction-7
V rin construction-7
 
I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2
 
I3 dp 2015_cricket-labs
I3 dp 2015_cricket-labsI3 dp 2015_cricket-labs
I3 dp 2015_cricket-labs
 
Inside bitcoins chicago short
Inside bitcoins chicago shortInside bitcoins chicago short
Inside bitcoins chicago short
 
Bitcoin Speculation
Bitcoin SpeculationBitcoin Speculation
Bitcoin Speculation
 

Dernier

Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaipriyasharma62062
 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...priyasharma62062
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...roshnidevijkn ( Why You Choose Us? ) Escorts
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...priyasharma62062
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...jeffreytingson
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...priyasharma62062
 
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...Call Girls in Nagpur High Profile
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...dipikadinghjn ( Why You Choose Us? ) Escorts
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7jayawati511
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesFalcon Invoice Discounting
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumFinTech Belgium
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 

Dernier (20)

Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
 
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
VIP Kalyan Call Girls 🌐 9920725232 🌐 Make Your Dreams Come True With Mumbai E...
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
Mira Road Memorable Call Grls Number-9833754194-Bhayandar Speciallty Call Gir...
 
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Sinhagad Road ⟟ 6297143586 ⟟ Call Me For Genuine S...
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 

Solving problems with authentication

  • 2. Yo Sub Kwon Co-founder of Launchkey
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Attacks • Compromised credentials of a privileged account • Direct access to cloud servers or hardware containing wallets or credentials • Compromised credentials on a mass scale of users with weak or shared passwords • Weak or compromised API keys • Trojans and Keyloggers • Bitcoin specialized malicious software
  • 9. Kill Passwords Along with many in the industry, we feel passwords and simple bearer tokens such as cookies are no longer sufficient to keep users safe -Google Vice President of Security Eric Grosse Using passwords for security is no longer safe for people -Jonathan LeBlanc, PayPal’s head of global developer advocacy FIDO hopes to make passwords a thing of the past -Kayvan Alikhani, senior director of technology at RSA
  • 10. Passwords are insecure • They’re inherently susceptible to brute-force attacks • They are typically stored in-band on servers (and elsewhere) while a knowledge factor of authentication is only effective so long as the individual retains sole possession of that secret. • They’re susceptible to human error by both the individuals that utilize passwords and the developers that implement them • Cracking hashed passwords becomes progressively easier with our ever increasing computing power • Due to password re-use, one password breach can result in obtaining credentials for multiple unrelated services
  • 11. Common Patches • Minimum password requirements • Password expirations • More passwords • One time passwords (OTP) as a second factor • Social Media logins
  • 12. Problems • Passwords are insecure • Multifactor authentication is technically complex • Out of band hardware is costly • New authentication measures can be disruptive to business
  • 13. Solutions – Passwords are insecure • Remove passwords • Authentication using mobile devices (BYOD) • Biometric authentication • Physical devices such as USB keys or wearables
  • 14. Solutions - Multifactor complexity • Decentralize the layer of authentication • Don’t do your own security • Fidoalliance.org
  • 15. Solutions – Disruptive to business • Offer multiple options to login • Passive factors of authentication
  • 16. Conclusions • Better security doesn’t need to be more difficult • Placing patches on authentication problems is not future-proof • Better security and easier to use authentication solutions do exist Encourage the services you use to offer them for their sake and yours