The Health of Security

After experiencing a massive ransomware attack that caused the near-shutdown of 400 sites, the Universal Health Services (UHS) has become the most recent example to highlight the issue of cybersecurity in health ...
Top Barriers to IT Security for SMBs

Top Barriers to IT Security for SMBs

Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and states,and they have had quite a year. 2020, as it stands, has ...
Top Barriers to IT Security for SMBs

Top Barriers to IT Security for SMBs

Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and states,and they have had quite a year. 2020, as it stands, has ...
Active Directory

Cleaning up the Active Directory Forest

Used by many organizations and enterprises, Microsoft’s Active Directory (AD) comprises several services that run on Windows Server to manage permissions and access to networked resources. Within the Active Directory configuration hierarchy, ...
Security Boulevard
credentials

The Pandemic of Credential-based Cyberattacks

The first half of 2020 is barely in the history books, and it is safe to assume that most business leaders are eager to close this chapter. Globally, there remains plenty of ...
Security Boulevard
Introducing DiceKeys

DiceKeys

| | cryptography, keys, passwords
DiceKeys is a physical mechanism for creating and storing a 192-bit key. The idea is that you roll a special set of twenty-five dice, put them into a plastic jig, and then ...
Identifying COVID-19 Phishing Scams

Identifying COVID-19 Phishing Scams

As we continue to move through 2020 it has become very clear that cyber criminals are taking advantage of the COVID-19 crisis as they continue to target new victims every day. In ...
credentials

Centrify Automates Password Reconciliation via Client

Centrify has extended its password access management (PAM) service to enable password reconciliation on the client. Torsten George, cybersecurity evangelist for Centrify, said enabling password reconciliation using Centrify client software in conjunction ...
Security Boulevard

From Stolen Credentials to Full Network Compromise

How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that stolen credentials are often the foothold that attackers use to compromise networks ...

Trusting Passwords: Best Practices for Threat-Proofing Credentials

“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the ...