passwords

Why CIOs need to focus on password exposure, not expiration
The cybersecurity market is growing even in the midst of the pandemic-driven economic downturn, with spending predicted to reach $123 billion by the end of the year. While …

Is passwordless authentication actually the future?
While passwords may not be going away completely, 92 percent of respondents believe passwordless authentication is the future of their organization, according to a LastPass …

iOS 14: New privacy and security features
Apple has released iOS 14, with a bucketload of new and improved functional features and a handful of privacy and security ones. New privacy and security features in iOS 14 …

Safari 14: New privacy and security features
Apple has released Safari 14, which features many functional improvements, a Privacy Report that shows all the trackers the browser has neutralized, and and does not support …

Securing Active Directory accounts against password-based attacks
Traditional password-based security might be headed for extinction, but that moment is still far off. In the meantime, most of us need something to prevent our worst instincts …

How do I select a password management solution for my business?
91 percent of people know that using the same password on multiple accounts is a security risk, yet 66 percent continue to use the same password anyway. IT security …

Five ways to maximize FIDO
Perform a quick Google search for “causes of data breaches”, and you will be inundated with reports of stolen credentials and weak passwords. Organizations can spend billions …

25% of IT workers don’t enforce security policies
14% of IT workers are consumed with Identity and Access Management (IAM), spending at least an hour per day on routine IAM tasks, according to 1Password. IAM continues to be a …

Remote working security challenges urge MFA implementation
The past few years have seen an increase in employees using personal devices and systems to access work emails and company databases, and exchange valuable information with …
A Boxcryptor audit shows no critical weaknesses in the software
More and more companies, self-employed and private customers are using Boxcryptor to protect sensitive data – primarily in the cloud. Boxcryptor ensures that nobody but …

Bad habits and risky behaviors put corporate data at risk
IT and application development professionals tend to exhibit risky behaviors when organizations impose strict IT policies, according to SSH. Polling 625 IT and application …

Account credentials of 26+ million LiveJournal users leaked online
A data dump containing account information of over 26 million LiveJournal users has been offered for sale on dark web marketplaces and is now being shared for free on …
Featured news
Resources
Don't miss
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)
- Phishers are increasingly impersonating electronic toll collection companies
- 7 ways to get C-suite buy-in on that new cybersecurity tool
- Building a cybersecurity strategy that survives disruption
- Open-source malware doubles, data exfiltration attacks dominate