Login credentials are a favorite target of today's cybercriminals, and two-factor authentication is now crucial to meet bare-minimum security standards.
Researchers have shown how generative adversarial networks (GANs) can be applied to cybersecurity tasks such as cracking passwords and identifying hidden data in high-quality images.
Three-fourths of young professionals are comfortable with biometric tools such as fingerprint scanning to access data, according to new IBM research that suggests organizations need to rethink how they approach millennials and technology. Young...
Companies that neglect basic security best practices are grappling with problems related to privileged account management, according to a recent survey.
Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
The man who first wrote about password strength has modified his stance and written new guidelines that IT managers should follow.
A new study found that most web services have poor password policy. What's the prescription for these protection problems?
These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.