passwords

The Health of Security

After experiencing a massive ransomware attack that caused the near-shutdown of 400 sites, the Universal Health Services (UHS) has become…

1 month ago

Top Barriers to IT Security for SMBs

Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and…

2 months ago

Top Barriers to IT Security for SMBs

Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and…

2 months ago

Cleaning up the Active Directory Forest

Used by many organizations and enterprises, Microsoft’s Active Directory (AD) comprises several services that run on Windows Server to manage…

3 months ago

The Pandemic of Credential-based Cyberattacks

The first half of 2020 is barely in the history books, and it is safe to assume that most business…

3 months ago

DiceKeys

DiceKeys is a physical mechanism for creating and storing a 192-bit key. The idea is that you roll a special…

3 months ago

Identifying COVID-19 Phishing Scams

As we continue to move through 2020 it has become very clear that cyber criminals are taking advantage of the…

4 months ago

Centrify Automates Password Reconciliation via Client

Centrify has extended its password access management (PAM) service to enable password reconciliation on the client. Torsten George, cybersecurity evangelist…

4 months ago

From Stolen Credentials to Full Network Compromise

How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that…

4 months ago

Trusting Passwords: Best Practices for Threat-Proofing Credentials

“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve…

5 months ago