Password Management and Policy News
May 01, 2015
News roundup: Many believe the government should help avert cybersecurity woes, yet two House-approved cybersecurity bills are frowned upon. Plus: DDoS increase linked to IoT; Google password alert; 70% put networks at risk with undocumented changes.
April 22, 2015
IoT discovery and federation controls are lacking. Benjamin Jun says the answer is to build better IoT federation and trust protocols.
March 10, 2015
The mobile payment app maker responds to criticism by stepping up security with better verifications and notifications for email and phone number changes.
January 08, 2015
Video: Lieberman Software CEO Philip Lieberman explains how privileged identity management can shore up the many weaknesses of password-based authentication.
Password Management and Policy Get Started
Bring yourself up to speed with our introductory content
Bring Your Own Authentication (BYOA) is a computing concept in which employee-owned devices are used as authentication credentials within the enterprise. Continue Reading
Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user. Continue Reading
In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password. Continue Reading
Evaluate Password Management and Policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
PCI DSS requirement 2 specifies companies must change vendor-supplied default passwords, but only 50% were in compliance. Expert Mike Chapple explains why. Continue Reading
Philip Lieberman of Lieberman Software discusses privileged accounts and how automated tools can help organizations monitor their use. Continue Reading
Explore the differences between consumer and enterprise password management products and learn pros and cons about the latest tools. Continue Reading
Product ReviewsPowered by IT Central Station
Enables us to sell products which creates significant revenue but their disaster recovery needs improvementPowered by IT Central Station
Valuable Features: The Registration/Login Management and Single Sign On tools are extremely valuable for us. They have allowed us to migrate a...Continue Reading
The UI for requesting and approving rights has been outdated, but in the latest version that has been addressedPowered by IT Central Station
Valuable Features: Event driven provisioning and powerful Development and documentation tool - Designer are the most valuable features on NetIQ...Continue Reading
Powered by IT Central Station
Valuable Features: Risk Analysis Engine Business-IT Role Mining, Certifications Dynamic Grouping Life Cycle Management Provisioning Integration...Continue Reading
Manage Password Management and Policy
Learn to apply best practices and optimize your operations.
In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches. Continue Reading
Lieberman Software CEO Philip Lieberman discusses why a successful privileged identity management program needs support from two key executives, plus how to avoid common mistakes. Continue Reading
Man-in-the-middle attack defense requires careful, layered security. Michael Cobb reviews the tactics enterprises should employ to stay secure. Continue Reading
Problem Solve Password Management and Policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products. Continue Reading
If Wi-Fi network passwords are accessed off Android mobile devices by third parties, it could mean disaster without the right precautions. Continue Reading
Network security expert Brad Casey discusses how to mitigate the vulnerability found in Cisco's TelePresence system triggered by default credentials. Continue Reading