Weak or broken authentication is acknowledged by the OWASP as easily exploitable by hackers with extreme damage potential. Users need to be authenticated when they are trying to access an application or a service in a reliable, secure (and convenient) manner but this is not always practiced. 81% of data […]
Multi-factor authentication
2 posts
Businesses need to regularly scan the external available infrastructure and applications to protect against external threats. They also need to scan internally to protect against insider threat and compromised individuals. The worst situation is to have an exploitable vulnerability within your infrastructure, application or employees, that you are not aware […]