A New Chapter Unfolds: SecureAuth Announces Acquisition of Cloudentity

Journal of Cyber Policy: Seeking The Root Causes of Cyber Insecurity Part III: People

Tram Nguyen
March 07, 2020

Get the latest from the SecureAuth Blog

Perspective from our CEO, Shahrokh Shahidzadeh

Authentication, a Weak Human/Machine Link

Experts who responded to the survey pointed out that the authentication process presents a poorly-designed security link between machines and human users. “80% of hacking-related breaches are still tied to passwords. It used to be 81%,” noted Shahrokh Shahidzadeh of Acceptto. His colleague, Fausto Oliveira, pointed out that risks arise from “baked in default usernames, passwords, service ports with inadequate defenses, privilege rights wrongly assigned to trivial services, lack of proper hardware identity and poor-to-no management of identity.”

Read the full article at Journal of Cyber Policywebsite.

Related Stories

Pin It on Pinterest

Share This