Blueprint: Build the Best in Cyber Defense

How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud

Mark Morowczynski and Tarek Dawoud explain phishing resistant credentials, covering their functionality, implementation, and the future of identity security. The discussion includes passwordless login, detecting identity attacks, and utilizing KQL.

Listen