By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Password management and policy News
January 12, 2017
In this episode of SearchSecurity's Risk & Repeat podcast, editors highlight the topics discussed at the CES Cybersecurity Forum, as well as new technologies showcased at the event.
August 03, 2016
Barclays is offering U.K. retail banking customers the option to do voice authentication instead of using passwords, with voiceprints that are as unique as fingerprints.
January 19, 2016
A new proof-of-concept attack presented at ShmooCon 2016 exploits security weaknesses in cloud-based password manager LastPass and could allow attackers to gain control of users' accounts.
December 08, 2015
A new report showed that while retail companies are confident in their security, many use bad access-management practices with temporary workers brought in for the holiday season.
Password management and policy Get Started
Bring yourself up to speed with our introductory content
The old username/password combination is not the safest form of ID management. See why two-factor authentication belongs in IT's mobile security arsenal and learn how to set it up. Continue Reading
Privilege creep is a constant threat. It's why privileged user management must be part of any comprehensive security plan and always at the top of an infosec pro's to-do list. Continue Reading
A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user. Continue Reading
Evaluate Password management and policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Jason Hong talks about Carnegie Mellon's work in social cybersecurity, a new discipline that uses techniques from social psychology to improve our ability to be secure online. Continue Reading
Tempe's private tech university added passwordless authentication via QR codes to ease Salesforce logins and add a layer of security. Continue Reading
The FIDO authentication standard could eventually bypass passwords, or at least augment them, as government and industry turns to more effective authentication technologies. Continue Reading
Manage Password management and policy
Learn to apply best practices and optimize your operations.
A security researcher recently discovered a list of 711 million records used by the Onliner spambot. Expert Matt Pascucci explains what actions exposed individuals should take. Continue Reading
Using the same local admin password is convenient, but risky. It gives attackers limitless access across the machines on the domain. Microsoft has a tool to boost login security. Continue Reading
Too often, privilege creep occurs via the software development team, the result of pressure to update or launch apps. Learn what tools and tactics can counter privilege creep. Continue Reading
Problem Solve Password management and policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A forgotten ESXi root password can stop you in your tracks. Avoid dodgy quick fixes and learn the proper way to recover a root password for vCenter-connected and stand-alone hosts. Continue Reading
Maintaining content security in your organization's CMS requires a delicate balance between security and usability. Learn about best practices for managing access to your content. Continue Reading
A Google Chrome flaw enables attackers to automatically download Windows credentials to their SMB sever. Expert Judith Myerson explains how that works. Continue Reading