Oct. 24, 2023, 5:14 p.m. | Security Weekly

Security Weekly www.youtube.com

We return to discussions of OAuth and all sorts of authentication. This time around we're looking at the design of authentication protocols, the kinds of trade-offs they weigh for adoption and security, and how a standard evolves over time to keep pace with new attacks and put to rest old mistakes.

Segment Resources:

- https://fusionauth.io/docs/v1/tech/core-concepts/modes
- https://webauthn.wtf/
- https://datatracker.ietf.org/doc/html/rfc7636
- https://www.ietf.org/about/participate/tao/

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw-260

adoption attacks authentication authentication protocols dan design discussions impact moore oauth protocols return security standard trade webauthn

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)