passwords
The Health of Security
After experiencing a massive ransomware attack that caused the near-shutdown of 400 sites, the Universal Health Services (UHS) has become the most recent example to highlight the issue of cybersecurity in health ...
Top Barriers to IT Security for SMBs
Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and states,and they have had quite a year. 2020, as it stands, has ...
Top Barriers to IT Security for SMBs
Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and states,and they have had quite a year. 2020, as it stands, has ...
Cleaning up the Active Directory Forest
Used by many organizations and enterprises, Microsoft’s Active Directory (AD) comprises several services that run on Windows Server to manage permissions and access to networked resources. Within the Active Directory configuration hierarchy, ...
The Pandemic of Credential-based Cyberattacks
The first half of 2020 is barely in the history books, and it is safe to assume that most business leaders are eager to close this chapter. Globally, there remains plenty of ...
DiceKeys
DiceKeys is a physical mechanism for creating and storing a 192-bit key. The idea is that you roll a special set of twenty-five dice, put them into a plastic jig, and then ...
Identifying COVID-19 Phishing Scams
As we continue to move through 2020 it has become very clear that cyber criminals are taking advantage of the COVID-19 crisis as they continue to target new victims every day. In ...
Centrify Automates Password Reconciliation via Client
Centrify has extended its password access management (PAM) service to enable password reconciliation on the client. Torsten George, cybersecurity evangelist for Centrify, said enabling password reconciliation using Centrify client software in conjunction ...
From Stolen Credentials to Full Network Compromise
How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that stolen credentials are often the foothold that attackers use to compromise networks ...
Trusting Passwords: Best Practices for Threat-Proofing Credentials
“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the ...

