Identity & Access Management , Security Operations , Video

ISMG Editors: Identity Security Special

Tackling MFA Fatigue Attacks; GSA Missteps; Next Steps for Digital Identity Bill
Clockwise, from top left: Anna Delaney, Mathew Schwartz, Jeremy Grant and Tom Field

In the latest weekly update, Venable's Jeremy Grant joins Information Security Media Group editors to discuss how to defend against the increasing use of MFA fatigue attacks, takeaways from a recent U.S. probe into compliance issues related to Login.gov services and the latest updates on the Improving Digital Identity Act.

See Also: Cloud Identity Security and the Power of PAM

The panelists - Anna Delaney, director, productions; Mathew Schwartz, executive editor, DataBreachToday and Europe; ISMG contributor Jeremy Grant, managing director, technology business strategy, Venable LLP; and Tom Field, senior vice president, editorial - discuss:

  • The growing risk of MFA fatigue attacks and how to combat them;
  • How the U.S. General Services Administration misled customers about Login.gov's compliance with digital identity standards;
  • The next steps in Congress on passage of the Improving Digital Identity Act, which would establish a governmentwide effort to develop secure identity verification methods for governmental agencies.

The ISMG Editors' Panel runs weekly. Don't miss our previous installments, including the March 24 edition discussing what's next in Russia's cyberwar and the April 3 edition discussing the fate of TikTok amid the overwhelming concerns of U.S. lawmakers.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.