The Lifecycle of a Password

| | all posts
Securing Passwords from Create to Retire Organizations are in a non-stop battle to protect their network and meet data security responsibilities in the face of ever-increasing cyberattacks. A key challenge is ensuring ...

Digital Home Security: How to stay safe while the world works from home

| | all posts
Working from home used to seem something of a luxury, reserved for those whose work might not rely on customer interaction or face to face meetings. But since April of this year, ...

Passwords in the Age of IoT

Connected devices are becoming increasingly prevalent in the home, at the office, and everywhere in between. With 2020 widely predicted to see the arrival of mainstream 5G adoption, we can only expect ...

CISO Survival Guide: Balancing Digital Transformation and Security

According to an IDC report, global digital transformation spending reached $1.8 trillion in 2019—up nearly 18% from 2018. What’s more, the firm expects digital transformation investments to total more than $6 trillion ...

Hashing: What You Need to Know About Storing Passwords

Cybersecurity isn’t always a battle to keep hackers out at all costs. Sometimes it’s actually about making the costs just not worth the effort. This is particularly true when it comes to ...

A Brief Summary of NIST Password Guidelines

National Institute of Standards and Technology (NIST) has been substantially revising its password guidelines since 2017. Previous recommendations have been changed, including combining symbols, letters, and numeric to create complex passwords; changing ...

Need Help Auditing for Compromised Passwords?

| | all posts
Password audits have become more difficult. New data breaches expose credentials every day. These are quickly fed into hackers’ cracking dictionaries, changing which passwords you need to keep out. Verizon’s DBIR found ...
Identity and Access Management has a Password Problem

Identity and Access Management has a Password Problem

Recent research from Enterprise Management Associates (EMA) found that a staggering 60% of organizations have experienced a security breach in the past year. Digging into the details, the leading source of breaches ...

8 Scary Statistics about the Password Reuse Problem

As we rapidly move everything online in response to the global pandemic, this has put passwords front and center again. With the latest Marriott breach, it’s like groundhog day when it comes ...

Employee Account Takeover in the Age of COVID-19

Account takeover for employees, customers, and users has become a real issue since the COVID-19 outbreak. Here is why that is and what organizations can do about it. Since its discovery in ...