After experiencing a massive ransomware attack that caused the near-shutdown of 400 sites, the Universal Health Services (UHS) has become…
Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and…
Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and…
Used by many organizations and enterprises, Microsoft’s Active Directory (AD) comprises several services that run on Windows Server to manage…
The first half of 2020 is barely in the history books, and it is safe to assume that most business…
DiceKeys is a physical mechanism for creating and storing a 192-bit key. The idea is that you roll a special…
As we continue to move through 2020 it has become very clear that cyber criminals are taking advantage of the…
Centrify has extended its password access management (PAM) service to enable password reconciliation on the client. Torsten George, cybersecurity evangelist…
How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that…
“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve…