Passwords

Passwords | News, how-tos, features, reviews, and videos

facial recognition - biometric security identification

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

login password - user permissions - administrative control

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them.

TSB Phishing page

Salted Hash – SC 02: What a TSB phishing attack looks like

In April, TSB (a retail and commercial bank in the UK) announced they would shutdown some systems for an IT upgrade. However, the upgrade was a disaster, and over a month later customers are still having problems. As a result,...

keys authentication

How risk-based authentication has become an essential security tool

A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them.

01 day breach calendar year

One year later: security debt makes me WannaCry

WannaCry rocked the world one year ago, but there are still lessons for us to unpack about the debt we still have to pay to be secure.

Apple phishing webpage

Salted Hash - SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take...

passwords

Will WebAuthn replace passwords or not?

Or, the password is dead – long live the password.

securitysmart primary

Get Security Smart

From the editors of CSO, Security Smart is a quarterly newsletter ready for distribution in your organization. We combine personal device and home safety tips with organizational security awareness, making security training relevant,...

passwords

1.4B stolen passwords are free for the taking: What we know now

The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords.

Robot Artificial Intelligence chat bot

The borg ate my login

There is no ‘one size fits all’ solution for bots...

little girl sunglasses bright future predictions big data

What cybersecurity surprises does 2018 hold?

One thing's for sure: securing ourselves and our organizations will only get more difficult this year.

Bank vault

Security myth: my admins would quit if I implement a password vault!

The issue of secure password vaulting and the concern that something like that could never work at your company.

meltdown spectre

In the aftermath of yet another Meltdown, no secrets are safe

Meltdown and Spectre reveal that perfect information protection comes at an increasingly steep cost.

4 change password

Password managers grow up, target business users

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.

hacker login password cliche

Leaked 1.4 billion credentials a risk to users and business

A more nuanced conversation is required to understand the risks that this interactive database poses to organizations.

6 password

Unraveling the truth about the NIST's new password guidelines

tl;dr: if you’re using a password manager, you should be in really good shape.

About half of those responding to an online survey say their passwords are over five years old.

Top 25 worst, most insecure passwords used in 2017

SplashData released a list of the top 100 most popular, and therefore dangerous, passwords used in 2017.

salted hash cms hero th3

Salted Hash Ep 12: Zero trust networks and other things that caught our attention in 2017

This week's episode of Salted Hash is the last one for 2017, so we're closing out the year by talking about security wins, and the incidents that held the attention of our panel. Steve is joined by Akamai's Dave Lewis, Andy Ellis and...

roadblock road blocked barrier

5 ways users circumvent security measures and how to prevent it

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

Load More
You Might Also Like