What is authentication?

Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, What is authentication?. The summary for this episode is: <p>This episode of <em>Techsplainers</em> introduces authentication, the cybersecurity process that verifies a user's identity before granting access to systems or data. The episode distinguishes authentication (proving who you are) from authorization (determining what you're allowed to do) and explores the four main authentication factors: something you know (passwords), something you have (security tokens), something you are (biometrics), and something you do (behavioral patterns). Modern authentication approaches are examined, including single sign-on (SSO), multi-factor authentication (MFA), adaptive authentication that uses AI to assess risk in real-time, and passwordless authentication using cryptographic passkeys. Technical standards like SAML, OAuth, and Kerberos are also explained. With account hijacking involved in 30% of cyber attacks, according to IBM's X-Force Threat Intelligence Index, strong authentication proves critical for security, access control, and regulatory compliance across industries like healthcare and finance. </p><p><br></p><p>Find more information at <a href="https://www.ibm.com/think/podcasts/techsplainers" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/podcasts/techsplainers</a></p><p><br></p><p><strong>Narrated by Bryan Clark</strong></p>

DESCRIPTION

This episode of Techsplainers introduces authentication, the cybersecurity process that verifies a user's identity before granting access to systems or data. The episode distinguishes authentication (proving who you are) from authorization (determining what you're allowed to do) and explores the four main authentication factors: something you know (passwords), something you have (security tokens), something you are (biometrics), and something you do (behavioral patterns). Modern authentication approaches are examined, including single sign-on (SSO), multi-factor authentication (MFA), adaptive authentication that uses AI to assess risk in real-time, and passwordless authentication using cryptographic passkeys. Technical standards like SAML, OAuth, and Kerberos are also explained. With account hijacking involved in 30% of cyber attacks, according to IBM's X-Force Threat Intelligence Index, strong authentication proves critical for security, access control, and regulatory compliance across industries like healthcare and finance.


Find more information at https://www.ibm.com/think/podcasts/techsplainers


Narrated by Bryan Clark