SlideShare a Scribd company logo
Solving Problems with
Authentication
Yo Sub Kwon
Co-founder of Launchkey
Attacks
• Compromised credentials of a privileged account
• Direct access to cloud servers or hardware containing wallets or
credentials
• Compromised credentials on a mass scale of users with weak or
shared passwords
• Weak or compromised API keys
• Trojans and Keyloggers
• Bitcoin specialized malicious software
Kill Passwords
Along with many in
the industry, we feel
passwords and
simple bearer tokens
such as cookies are
no longer sufficient
to keep users safe
-Google Vice
President of Security
Eric Grosse
Using passwords for security
is no longer safe for people
-Jonathan LeBlanc, PayPal’s
head of global developer
advocacy
FIDO hopes to make passwords a
thing of the past
-Kayvan Alikhani, senior director of
technology at RSA
Passwords are insecure
• They’re inherently susceptible to brute-force attacks
• They are typically stored in-band on servers (and elsewhere) while a
knowledge factor of authentication is only effective so long as the
individual retains sole possession of that secret.
• They’re susceptible to human error by both the individuals that utilize
passwords and the developers that implement them
• Cracking hashed passwords becomes progressively easier with our
ever increasing computing power
• Due to password re-use, one password breach can result in obtaining
credentials for multiple unrelated services
Common Patches
• Minimum password requirements
• Password expirations
• More passwords
• One time passwords (OTP) as a second factor
• Social Media logins
Problems
• Passwords are insecure
• Multifactor authentication is technically complex
• Out of band hardware is costly
• New authentication measures can be disruptive to business
Solutions – Passwords are insecure
• Remove passwords
• Authentication using mobile devices (BYOD)
• Biometric authentication
• Physical devices such as USB keys or wearables
Solutions - Multifactor complexity
• Decentralize the layer of authentication
• Don’t do your own security
• Fidoalliance.org
Solutions – Disruptive to business
• Offer multiple options to login
• Passive factors of authentication
Conclusions
• Better security doesn’t need to be more difficult
• Placing patches on authentication problems is not future-proof
• Better security and easier to use authentication solutions do exist
Encourage the services you use to offer them for their sake and yours

More Related Content

What's hot

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
Will Adams
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
Mike Stone
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile EnterpriseIBM Danmark
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Vikash Lalsing (CITP)
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
IoT Product development Meetup
IoT Product development MeetupIoT Product development Meetup
IoT Product development Meetup
Itai Voller
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
Denim Group
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
Santosh Satam
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
Sophos Benelux
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
PacSecJP
 
Enterprise Collaboration - 4
Enterprise Collaboration - 4Enterprise Collaboration - 4
Enterprise Collaboration - 4
Nitin Kohli
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for Success
Windham Brannon
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
Lisa Young
 
Electronic security
Electronic securityElectronic security
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
Abhinav Biswas
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
ESET
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
Peter Hewer
 

What's hot (20)

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Plain talk about security public - ms1
Plain talk about security   public - ms1Plain talk about security   public - ms1
Plain talk about security public - ms1
 
Securing the Mobile Enterprise
Securing the Mobile EnterpriseSecuring the Mobile Enterprise
Securing the Mobile Enterprise
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
IoT Product development Meetup
IoT Product development MeetupIoT Product development Meetup
IoT Product development Meetup
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
Enterprise Collaboration - 4
Enterprise Collaboration - 4Enterprise Collaboration - 4
Enterprise Collaboration - 4
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for Success
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
 

Viewers also liked

Bitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondBitcoin, Blockchain & Beyond
Bitcoin, Blockchain & Beyond
MecklerMedia
 
Steve beauregard keynote
Steve beauregard keynoteSteve beauregard keynote
Steve beauregard keynote
MecklerMedia
 
Buy and Sell By paymium
Buy and Sell By paymiumBuy and Sell By paymium
Buy and Sell By paymium
LaFrenchMobile
 
Pdf guerrilla marketing
Pdf guerrilla marketingPdf guerrilla marketing
Pdf guerrilla marketing
MecklerMedia
 
Bitcoin Payment Focus
Bitcoin Payment Focus Bitcoin Payment Focus
Bitcoin Payment Focus
MecklerMedia
 
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
Inside 3 d printing   metamoderism, leslie oliver karpas (save small)Inside 3 d printing   metamoderism, leslie oliver karpas (save small)
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
MecklerMedia
 
151021 metamason 10 page competition pitch
151021   metamason 10 page competition pitch151021   metamason 10 page competition pitch
151021 metamason 10 page competition pitch
MecklerMedia
 
Bitcoin Past Present Future
Bitcoin Past Present FutureBitcoin Past Present Future
Bitcoin Past Present Future
MecklerMedia
 
The Cognitive Era
The Cognitive EraThe Cognitive Era
The Cognitive Era
MecklerMedia
 
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Vidal Chriqui
 
A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)
MecklerMedia
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
MecklerMedia
 
Cloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingCloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printing
MecklerMedia
 
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
FrancisPouliot
 
Les Alternatives à la Blockchain
Les Alternatives à la BlockchainLes Alternatives à la Blockchain
Les Alternatives à la Blockchain
Cyril Grunspan
 

Viewers also liked (15)

Bitcoin, Blockchain & Beyond
Bitcoin, Blockchain & BeyondBitcoin, Blockchain & Beyond
Bitcoin, Blockchain & Beyond
 
Steve beauregard keynote
Steve beauregard keynoteSteve beauregard keynote
Steve beauregard keynote
 
Buy and Sell By paymium
Buy and Sell By paymiumBuy and Sell By paymium
Buy and Sell By paymium
 
Pdf guerrilla marketing
Pdf guerrilla marketingPdf guerrilla marketing
Pdf guerrilla marketing
 
Bitcoin Payment Focus
Bitcoin Payment Focus Bitcoin Payment Focus
Bitcoin Payment Focus
 
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
Inside 3 d printing   metamoderism, leslie oliver karpas (save small)Inside 3 d printing   metamoderism, leslie oliver karpas (save small)
Inside 3 d printing metamoderism, leslie oliver karpas (save small)
 
151021 metamason 10 page competition pitch
151021   metamason 10 page competition pitch151021   metamason 10 page competition pitch
151021 metamason 10 page competition pitch
 
Bitcoin Past Present Future
Bitcoin Past Present FutureBitcoin Past Present Future
Bitcoin Past Present Future
 
The Cognitive Era
The Cognitive EraThe Cognitive Era
The Cognitive Era
 
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
Développer un serveur de micropayment bitcoin - REX sur 2 implémentations - O...
 
A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)A copyright protection technology for 3 d printing models (john choi)
A copyright protection technology for 3 d printing models (john choi)
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
 
Cloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printingCloud infrastructure of 3 d printing
Cloud infrastructure of 3 d printing
 
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
Bitcoin: Repenser la monnaie (Bitcoin: rethinking money)
 
Les Alternatives à la Blockchain
Les Alternatives à la BlockchainLes Alternatives à la Blockchain
Les Alternatives à la Blockchain
 

Similar to Solving problems with authentication

Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration Solutions
Gabriella Davis
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos De Pedro
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
Precisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
Precisely
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_designNCC Group
 
A Better Method of Authentication
A Better Method of AuthenticationA Better Method of Authentication
A Better Method of Authentication
Osterman Research, Inc.
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
Net at Work
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
Neelkamal Gaharwar
 

Similar to Solving problems with authentication (20)

Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration Solutions
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
A Better Method of Authentication
A Better Method of AuthenticationA Better Method of Authentication
A Better Method of Authentication
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
Security Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloudSecurity Considerations for Microservices and Multi cloud
Security Considerations for Microservices and Multi cloud
 

More from MecklerMedia

Global Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookGlobal Capital Markets & Industry Outlook
Global Capital Markets & Industry Outlook
MecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
MecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
MecklerMedia
 
Why Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseWhy Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to Increase
MecklerMedia
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
MecklerMedia
 
Building a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoBuilding a Robotics Hub in San Diego
Building a Robotics Hub in San Diego
MecklerMedia
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical People
MecklerMedia
 
Inside 3 d printing 2015
Inside 3 d printing 2015Inside 3 d printing 2015
Inside 3 d printing 2015
MecklerMedia
 
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
MecklerMedia
 
Designing for the dmls process oct2015
Designing for the dmls process oct2015Designing for the dmls process oct2015
Designing for the dmls process oct2015
MecklerMedia
 
Inside 3 d printing presentation lisa
Inside 3 d printing presentation lisaInside 3 d printing presentation lisa
Inside 3 d printing presentation lisa
MecklerMedia
 
Inside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamInside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranpham
MecklerMedia
 
Efesto presentation kunal varma
Efesto presentation  kunal varmaEfesto presentation  kunal varma
Efesto presentation kunal varma
MecklerMedia
 
Infra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideInfra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslide
MecklerMedia
 
V rin construction-7
V rin construction-7V rin construction-7
V rin construction-7
MecklerMedia
 
I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2
MecklerMedia
 
I3 dp 2015_cricket-labs
I3 dp 2015_cricket-labsI3 dp 2015_cricket-labs
I3 dp 2015_cricket-labs
MecklerMedia
 
Inside bitcoins chicago short
Inside bitcoins chicago shortInside bitcoins chicago short
Inside bitcoins chicago short
MecklerMedia
 
Bitcoin Speculation
Bitcoin SpeculationBitcoin Speculation
Bitcoin Speculation
MecklerMedia
 

More from MecklerMedia (19)

Global Capital Markets & Industry Outlook
Global Capital Markets & Industry OutlookGlobal Capital Markets & Industry Outlook
Global Capital Markets & Industry Outlook
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Why Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to IncreaseWhy Bitcoin’s Rate of Adoption is Only Going to Increase
Why Bitcoin’s Rate of Adoption is Only Going to Increase
 
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into GoldCognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
Cognitive Reasoning Platforms – Spinning Social Media Interactions into Gold
 
Building a Robotics Hub in San Diego
Building a Robotics Hub in San DiegoBuilding a Robotics Hub in San Diego
Building a Robotics Hub in San Diego
 
Blockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical PeopleBlockchain Technology: A Technical Introduction to Non-Technical People
Blockchain Technology: A Technical Introduction to Non-Technical People
 
Inside 3 d printing 2015
Inside 3 d printing 2015Inside 3 d printing 2015
Inside 3 d printing 2015
 
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
Quality assurance, repeatability and monitoring on additive manufacturing.ppt...
 
Designing for the dmls process oct2015
Designing for the dmls process oct2015Designing for the dmls process oct2015
Designing for the dmls process oct2015
 
Inside 3 d printing presentation lisa
Inside 3 d printing presentation lisaInside 3 d printing presentation lisa
Inside 3 d printing presentation lisa
 
Inside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranphamInside3 dp santa clara 22oct2015 via tuan tranpham
Inside3 dp santa clara 22oct2015 via tuan tranpham
 
Efesto presentation kunal varma
Efesto presentation  kunal varmaEfesto presentation  kunal varma
Efesto presentation kunal varma
 
Infra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslideInfra trac 3d-102115-summaryslide
Infra trac 3d-102115-summaryslide
 
V rin construction-7
V rin construction-7V rin construction-7
V rin construction-7
 
I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2I3 dp tc santa clara oct2015 distro v2
I3 dp tc santa clara oct2015 distro v2
 
I3 dp 2015_cricket-labs
I3 dp 2015_cricket-labsI3 dp 2015_cricket-labs
I3 dp 2015_cricket-labs
 
Inside bitcoins chicago short
Inside bitcoins chicago shortInside bitcoins chicago short
Inside bitcoins chicago short
 
Bitcoin Speculation
Bitcoin SpeculationBitcoin Speculation
Bitcoin Speculation
 

Recently uploaded

234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt
PravinPatil144525
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Henry Tapper
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
Writo-Finance
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
VishnuVenugopal84
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
DOT TECH
 
Scope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theoriesScope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theories
nomankalyar153
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
DOT TECH
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
DOT TECH
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
InterCars
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
va2132004
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
Falcon Invoice Discounting
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf
morearsh02
 

Recently uploaded (20)

234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
 
Scope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theoriesScope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theories
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf
 

Solving problems with authentication

  • 2. Yo Sub Kwon Co-founder of Launchkey
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Attacks • Compromised credentials of a privileged account • Direct access to cloud servers or hardware containing wallets or credentials • Compromised credentials on a mass scale of users with weak or shared passwords • Weak or compromised API keys • Trojans and Keyloggers • Bitcoin specialized malicious software
  • 9. Kill Passwords Along with many in the industry, we feel passwords and simple bearer tokens such as cookies are no longer sufficient to keep users safe -Google Vice President of Security Eric Grosse Using passwords for security is no longer safe for people -Jonathan LeBlanc, PayPal’s head of global developer advocacy FIDO hopes to make passwords a thing of the past -Kayvan Alikhani, senior director of technology at RSA
  • 10. Passwords are insecure • They’re inherently susceptible to brute-force attacks • They are typically stored in-band on servers (and elsewhere) while a knowledge factor of authentication is only effective so long as the individual retains sole possession of that secret. • They’re susceptible to human error by both the individuals that utilize passwords and the developers that implement them • Cracking hashed passwords becomes progressively easier with our ever increasing computing power • Due to password re-use, one password breach can result in obtaining credentials for multiple unrelated services
  • 11. Common Patches • Minimum password requirements • Password expirations • More passwords • One time passwords (OTP) as a second factor • Social Media logins
  • 12. Problems • Passwords are insecure • Multifactor authentication is technically complex • Out of band hardware is costly • New authentication measures can be disruptive to business
  • 13. Solutions – Passwords are insecure • Remove passwords • Authentication using mobile devices (BYOD) • Biometric authentication • Physical devices such as USB keys or wearables
  • 14. Solutions - Multifactor complexity • Decentralize the layer of authentication • Don’t do your own security • Fidoalliance.org
  • 15. Solutions – Disruptive to business • Offer multiple options to login • Passive factors of authentication
  • 16. Conclusions • Better security doesn’t need to be more difficult • Placing patches on authentication problems is not future-proof • Better security and easier to use authentication solutions do exist Encourage the services you use to offer them for their sake and yours