<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Authentication on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/authentication/</link><description>Recent content in Authentication on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 27 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/authentication/index.xml" rel="self" type="application/rss+xml"/><item><title>Identity is the New Perimeter — How Attackers Bypass MFA in 2026</title><link>https://www.securityin45.com/blog/2026-03-27-identity-is-the-new-perimeter-how-attackers-bypass-mfa-in-2026/</link><pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-27-identity-is-the-new-perimeter-how-attackers-bypass-mfa-in-2026/</guid><description>&lt;p&gt;&lt;img src="https://www.securityin45.com/images/si45-s3e2-thumbnail.png" alt="Identity is the New Perimeter - Season 3 Episode 2"&gt;&lt;/p&gt;
&lt;p&gt;For years, the security industry built its defenses around the network perimeter — firewalls, VPNs, DMZs. But in 2026, that perimeter has fundamentally shifted. According to the latest Verizon DBIR and CrowdStrike Global Threat Report, identity-based attacks have officially overtaken email as the number one threat vector. Attackers are no longer trying to break through your &lt;a href="https://www.securityin45.com/pillars/firewall/"&gt;firewall&lt;/a&gt; — they are logging in with legitimate credentials. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento unpack why identity is the new perimeter, how modern attacks exploit &lt;a href="https://www.securityin45.com/glossary/"&gt;MFA&lt;/a&gt; weaknesses, and what organizations must do to defend themselves.&lt;/p&gt;</description></item></channel></rss>