Nov. 11, 2022, 2:20 a.m. | Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono

cs.CR updates on arXiv.org arxiv.org

Risk-based authentication (RBA) aims to protect users against attacks
involving stolen passwords. RBA monitors features during login, and requests
re-authentication when feature values widely differ from previously observed
ones. It is recommended by various national security organizations, and users
perceive it more usable and equally secure than equivalent two-factor
authentication. Despite that, RBA is still only used by very few online
services. Reasons for this include a lack of validated open resources on RBA
properties, implementation, and configuration. This effectively …

authentication large password password security risk risk-based authentication scale security service world

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Penetration Tester

@ Resillion | Bengaluru, India

Senior Backend Software Engineer (Java) - Privacy Engineering (Open to remote across ANZ)

@ Canva | Sydney, Australia

(Senior) Information Security Professional (w/m/d)

@ IONOS | Deutschland - Remote

Information Security (Incident Response) Intern

@ Eurofins | Katowice, Poland

Game Penetration Tester

@ Magic Media | Belgrade, Vojvodina, Serbia - Remote