logo
episode-header-image
Aug 2024
39m 15s

Implementing Passkeys with Tarek Dawoud

Richard Campbell
About this episode

Are you ready for passkeys? Richard talks to Tarek Dawoud from Microsoft about the evolution of passwordless access with passkeys. Tarek talks about the FIDO alliance and the ongoing effort to create authentication strategies that are mathematically impossible to phish - no password stuffing under the covers that might get exploited by a man-in-the-middle attack. The conversation also dives into the passkeys name and how it's a rebranding of passwordless authentication to make it easier for everyone to understand that you'd rather have a passkey than a password. The products involved are still evolving, but there's plenty you can take advantage of today and make your organization more phishing-resistant than ever!

Links

Recorded June 3, 2024

Up next
Jul 9
Building Real Software using PowerApps with Luise Freese
How does a PowerApp become a fully-fledged software application? Richard chats with Luise Freese about her experience of taking a PowerApp built by an individual through the "onboarding process" of becoming a complete software application, including requirements, tests, deploymen ... Show More
38m 35s
Jul 2
More Azure Innovations with Mark Russinovich
How has Azure been innovating lately? While at Build Richard chatted with Azure CTO Mark Russinovich about some of the latest innovations in Azure, including some of the new hardware available. Mark talks about working with hardware manufacturers to build servers optimized to the ... Show More
30m 18s
Jun 25
Getting More from GitHub with April Yoho
How do you get more from GitHub in your work routine? Richard chats with April Yoho about how sysadmins can take advantage of more GitHub features to make better quality scripts and more! April discusses the capabilities of GitHub Copilot to assist administrators in comprehending ... Show More
33m 10s
Recommended Episodes
Jul 2024
Opal Security's Umaimah Khan on Security-First Identity
Too often, usernames and passwords are the only thing standing between cyber criminals and an organization's data. While it seems obvious, implementing stronger identity controls has historically been a challenge for organizations because the mechanisms that cut off access to thr ... Show More
36 m
Feb 2025
154: Hijacked Line
Conor Freeman (x.com/conorfrmn) stole money online. Lot’s of it. In this episode we talk with him, and hear how he did it, why he did, and what he spent it on.Conor’s website: https://conorfreeman.ieConor’s X: https://x.com/conorfrmnSponsorsSupport for this show comes from Threat ... Show More
1h 6m
Sep 2020
Crypto-Security and block chain innovations
The popularity of cryptocurrency is beginning to extend beyond bitcoin as more and more banks are getting hacked. But there can be other uses of this technology and how secure is it all? Ex-hacker and Brand Ambassador for CTRL Group Bastien Treptel is joined by Jacob Yocom-Piatt, ... Show More
32m 8s
Feb 2025
SN 1014: FREEDOM Administration Login - Apple's UK Privacy Showdown, $1.5 Billion Crypto Heist
Apple disables Advanced Data Protection for new UK users. Paying ransoms is not as cut and dried as we might imagine. Elon Musk's "X" social media blocks "Signal.me" links. Spain's soccer league blocks Cloudflare and causes a mess. Two new (and rare) vulnerabilities discovered in ... Show More
2h 39m
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it t ... Show More
36m 29s
Feb 2024
PP001: WPA3: Everything You Wanted To Know But Were Afraid To Ask
It’s time to make the switch from WPA2 to WPA3. We cover how to do it and what migration challenges to be prepared for no matter what WLAN you are dealing with (open, passphrase, or 802.1x) . We also discuss what features make WPA3 an improvement over WPA2, particularly the repla ... Show More
31m 59s
Jan 2021
How Cryptocurrency Can Protect Transactional Privacy with Monero's Riccardo Spagni (Fluffy Pony)
Bully sits down with Riccardo Spagni (@FluffyPony) to discuss the history of Monero and how cryptocurrency can help protect transactional privacy in the digital age. They dive into the regulatory pressures surrounding privacy coins (including Monero's recent legal opinion on the ... Show More
1 h