X-Force November 27, 2017 The ‘Cracken’ in Action: A Password Cracking Adventure 4 min read - To maximize the horsepower of its password cracking system, the IBM X-Force team built its own hardware to aid in penetration testing efforts.
Retail November 22, 2017 Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season 5 min read - Consumers and retailers should implement these basic cybersecurity tips year-round to stay secure during the busy holiday shopping season.
November 9, 2017 Privileged Account Management Remains Problematic 2 min read - Companies that neglect basic security best practices are grappling with problems related to privileged account management, according to a recent survey.
X-Force November 6, 2017 How Not to Store Passwords: SHA-1 Fails Again 3 min read - Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
Energy & Utility October 30, 2017 Addressing the Clear and Present Danger of an Electrical Power Grid Breach 4 min read - Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.
Endpoint October 12, 2017 Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM 3 min read - These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.
Fraud Protection October 11, 2017 Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month 2 min read - Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.
X-Force October 10, 2017 The ‘Cracken’: The Evolution of Password Cracking 3 min read - IBM X-Force Red is leading the way in the field of password cracking with the Cracken, a tool designed to help companies improve password hygiene.
Endpoint September 20, 2017 Have We Been Wrong All Along About Good Password Practices? 3 min read - In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.
Identity & Access September 7, 2017 Security Specialists Discuss Identity and Access Management in the Age of Ransomware 7 min read - Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.