Search
Edgescan Now on AWS Marketplace: Seamless Security Testing, Natively Integrated with AWS

Edgescan Questions & Answers with Troy Hunt Part 3

The Edgescan Team Sent Questions to Troy Hunt (Part 3 of 3)

 

 

Troy answers the following questions in this video

 

  1. Just as traditional login credentials where somewhat reliable before MFA became vital, do you think at some point MFA as we know it would not be enough to secure an application user? If yes, can you think of what the next layer of user authentication mechanism would look like?

  2. While developing haveibeenpwned , did the thought ever cross your mind that this could be used as a counterproductive tool, i.e. used in a social engineering attack, obtaining information that could be used for leverage on a person who may be up to no good and forcing them to pay ransom to keep the data safe. Having accounts, they shouldn’t have etc. gambling/ dating sites?

  3. What advice would you give to companies like Edgescan to try encourage other organisations to improve their policies around credentials. Should all developers be looking to hook into the haveibeenpawned api?

  4. Can a better experience while using MFA (multi-factor authentication) be created especially for non-tech savvy individuals

 

Be sure to subscribe to the Edgescan Blog.  Watch /edgescan-questions-answers-with-troy-hunt-part-2/“>Part 2 here.

Big thanks to Troy for being so generous with his time and to the Edgescan team for coming up with the questions.

 

Troy Hunt is behind “Have I Been Pwned” and is a Microsoft Regional Director and MVP who travels the world speaking at events and training technology professionals.

 

 

 

Related Articles

“Automated penetration testing” has become a popular marketing term. The promise is appealing: efficient, scalable security assessments that run continuously …

Compliance checklists create the illusion of data protection. Quarterly scans, access control audits, encryption validation – all necessary, but insufficient …

Data protection has moved from compliance requirement to board-level concern. In 2026, CISOs face increasing pressure to demonstrate how security …

Contact us for more information on how Edgescan can help secure your business.