Blueprint: Build the Best in Cyber Defense
How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud
Mark Morowczynski and Tarek Dawoud explain phishing resistant credentials, covering their functionality, implementation, and the future of identity security. The discussion includes passwordless login, detecting identity attacks, and utilizing KQL.