Foundry. Formerly IDG Communications. Foundry. Formerly IDG Communications.
  • In-Person Events
    • FutureIT Series
    • CIO100 Symposium & Awards
    • CSO50 Conference + Awards
    • Dinners
    • Keynotes & Cocktails
  • Virtual Events
    • Summits
    • Roundtables + Custom events
  • Leadership events + Awards
  • Sponsorship
  • Contact

Credential Stuffing Attacks: How to mitigate with Auth0

Jamie Hughes, Lead Solutions Engineer, AuthO

As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.

In credential stuffing attacks, threat actors use stolen credentials from one breach to takeover users’ other accounts. This is effective because 65% of people reuse passwords across multiple accounts, according to Google. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.

Wish to attend an upcoming event as a participant?
Get in touch.

Sign up now

CONTACT

Debra Becker
Senior Marketing Director, Foundry North America Events
debra_becker@foundryco.com

 

Connect

Get the latest updates at #CIO

Follow

twitter facebook linkedin
Foundry. Formerly IDG Communications
© 2023 IDG All Rights Reserved
Privacy Policy
CIO, Computerworld, CSO, InfoWorld, Networkworld