How do you authenticate people based on data attributes they know when that very information is continually popping up in data breaches? It's a hard problem with no easy answers.
by Troy Hunt via IT Pro - Microsoft Windows Information, Solutions, Tools
No comments:
Post a Comment