

Live Series with the Experts
Pentesters Chat
Discuss tips, techniques and trends in offensive security!



Register to join our next Pentesters Chat: The Double-Edged Sword of Single Sign On (SSO) on Friday, March 7 at 12 p.m. CT! During this session, the Sprocket Testers will debate the good and the bad of SSO and discuss:
- Improved user experience with only needing to log in once to access multiple application and services.
- Credential stuffing after a user's credentials are compromised and attackers can potentially use these creds to attempt unauthorized access to other services.
- Centralized access control for administrators to manage user access to multiple applications from a single point.
- Account takeover via identity providers (IdPs) misconfiguration could allow an attacker to take over accounts or impersonate legitimate users.
On this Pentesters Chat from the Sprocket Team: