3 min read - Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
2 min read - A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
2 min read - The man who first wrote about password strength has modified his stance and written new guidelines that IT managers should follow.
3 min read - A new study found that most web services have poor password policy. What's the prescription for these protection problems?
2 min read - These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.
2 min read - Upon analyzing a massive password dump, Duo Labs concluded that users are slowly but surely adopting recommended password security best practices.
3 min read - Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.
3 min read - Will passwords become things of the past in 2017? Today, organizations tasked with managing too many passwords are at risk of phishing and malware attacks.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.