Access "Alternatives to passwords: Replacing the ubiquitous authenticator"
This article is part of the December 2011 issue of An insider look at the Windows Vista security review
The joke voted the funniest at the Edinburgh Fringe this year was about an unlikely subject: “I needed a password eight characters long so I picked Snow White and the Seven Dwarves.” Funny or not, the fact that it made so many people laugh just shows how much passwords -- and the challenges they pose -- have become part of our mainstream 21st century existence. Passwords have been a problem since the dawn of computing. They tend to be either so complex that no one can remember them, or so obvious that anyone could guess them. And the problem is getting even tougher. Anyone who has an encrypted laptop, conducts online banking or online shopping, and uses social networking sites is likely to have dozens of passwords to remember: far too many for one human mind to retain. Some users choose to write their passwords down on paper and keep them in their desk drawers or (even worse) stick the paper to their computer screens. Others take the line of least resistance and use the same password for multiple accounts. Either route is risky. So have we reached a point ... Access >>>
Premium Content for Free.
SEC guidance clarifies cybersecurity disclosure requirements
by Marcia Savage
Companies need to factor security risks and incidents in their financial disclosures, agency says.
Enterprise digital rights management best practices
by Rich Mogull
EDRM brings users into security more than any other tool. Are you ready?
- SEC guidance clarifies cybersecurity disclosure requirements by Marcia Savage
Alternatives to passwords: Replacing the ubiquitous authenticator
by Ron Condon
As the relative security of passwords falters, are they destined for obscurity?
Chris Paget on Vista final software security review
by Chris Paget, Contributor
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.
- Alternatives to passwords: Replacing the ubiquitous authenticator by Ron Condon
The ongoing debate over a federal breach notification law
by Marcia Savage
Lawmakers continue to wrangle over creation of a national data breach notification standard.
Good information security leaders must be good security recruiters
by Lee Kushner and Mike Murray
If you’re going to lure topnotch talent, refine your skills.
The need for cloud computing security standards
by Amy Larsen DeCarlo, Contributor
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.
- The ongoing debate over a federal breach notification law by Marcia Savage
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...