FullProxy’s Adrian Clarke and Donald Ross talk about OWASP #2 Broken Authentication and F5’s WAF. This video explores how broken authentication can be used by a hacker to gain access to your system using methods such as common passwords and brute forcing accounts. The F5 WAF helps to mitigate against this type of attack.
Subscribe to our YouTube Channel for more great Cyber Security insight and discussion.
For more information on FullProxy e-mail us at [email protected]