March 6, 2020

Journal of Cyber Policy: Seeking The Root Causes of Cyber Insecurity Part III: People

Perspective from our CEO, Shahrokh Shahidzadeh

Authentication, a Weak Human/Machine Link

Experts who responded to the survey pointed out that the authentication process presents a poorly-designed security link between machines and human users. “80% of hacking-related breaches are still tied to passwords. It used to be 81%,” noted Shahrokh Shahidzadeh of Acceptto. His colleague, Fausto Oliveira, pointed out that risks arise from “baked in default usernames, passwords, service ports with inadequate defenses, privilege rights wrongly assigned to trivial services, lack of proper hardware identity and poor-to-no management of identity.”

Read the full article at Journal of Cyber Policywebsite.

cybersecurity passwordless authentication iam solutions