Password Management and Policy News
April 22, 2015
IoT discovery and federation controls are lacking. Benjamin Jun says the answer is to build better IoT federation and trust protocols.
March 10, 2015
The mobile payment app maker responds to criticism by stepping up security with better verifications and notifications for email and phone number changes.
January 08, 2015
Video: Lieberman Software CEO Philip Lieberman explains how privileged identity management can shore up the many weaknesses of password-based authentication.
October 03, 2014
News roundup: Palo Alto's next-generation firewall fared poorly in a recent NSS Labs report, leading to a testy back-and-forth about NGFW testing. Plus: Mitnick selling zero days; EMET bypassed, again; iThemes stored plaintext passwords.
Password Management and Policy Get Started
Bring yourself up to speed with our introductory content
Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user. Continue Reading
In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password. Continue Reading
Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products. Continue Reading
Evaluate Password Management and Policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
PCI DSS requirement 2 specifies companies must change vendor-supplied default passwords, but only 50% were in compliance. Expert Mike Chapple explains why. Continue Reading
Philip Lieberman of Lieberman Software discusses privileged accounts and how automated tools can help organizations monitor their use. Continue Reading
Explore the differences between consumer and enterprise password management products and learn pros and cons about the latest tools. Continue Reading
Manage Password Management and Policy
Learn to apply best practices and optimize your operations.
In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches. Continue Reading
Lieberman Software CEO Philip Lieberman discusses why a successful privileged identity management program needs support from two key executives, plus how to avoid common mistakes. Continue Reading
Man-in-the-middle attack defense requires careful, layered security. Michael Cobb reviews the tactics enterprises should employ to stay secure. Continue Reading
Problem Solve Password Management and Policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
If Wi-Fi network passwords are accessed off Android mobile devices by third parties, it could mean disaster without the right precautions. Continue Reading
Network security expert Brad Casey discusses how to mitigate the vulnerability found in Cisco's TelePresence system triggered by default credentials. Continue Reading
In light of the Adobe password breach, expert Michele Chubirka explains the difference between encryption and hashing when storing passwords. Continue Reading