Encryption vs. hashing: Learning from Adobe's password breach

Password Management and Policy

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to safely issue passwords to new users

    In this Ask the Expert Q&A, our identity management and access control expert Joel Dubin offers tips on safe password distribution, and reviews the common mistakes that help desks and system administrators make when issuing new passwords. 

  • IAM Security School quick quiz

     

  • Endpoint security protection: Policies for endpoint control

    In this lesson, guest instructor Ben Rothke, Director of Security Technology Implementation for a large financial services company, provides tactics for endpoint security, policies for controlling endpoints and insight as to where endpoint security t... 

  • Looking ahead to life without passwords

    Security pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to stronger authentication. 

  • Inside the numbers: Access (out of) control?

    In April, SearchSecurity.com surveyed 358 IT professionals from a variety of industries regarding their identity and access management programs. Here is a look at some of the questions we asked and the answers they gave. 

  • How do I secure Windows NT/XP using the NetBIOS and LDAP protocols?

    In this Ask the Expert Q&A, our security threats expert, Ed Skoudis, discusses how to secure Windows NT/XP using the NetBIOS and LDAP protocols and what steps should be taken to protect against intruders. 

  • Security Bytes: Massive fraud via Web payment site

    McAfee fixes Webshield flaw, Trend Micro data is compromised; and Apple fixes its Mac OS X firmware. 

  • Adding 'fudge' to your passwords

    Many end users easily have half a dozen passwords to access the various Web apps they need to do their jobs. With this tip, you can enforce strong password policies -- and allow your users to write down their passwords. 

  • Maturing federated ID market shows security promise

    Until recently, investing in an federated identity management product didn't always make sense, as the technology was hardly mature enough for enterprise-wide adoption. These days, vendors small and large have viable products to fill all sorts of nee... 

  • Creating secure passwords you don't have to remember

    It's easy to tell users to create strong passwords, but hard to get them to do it. And when they do, it's common to see them written on a sticky note attached to someone's monitor. So what's the answer? It might be an online application that promises...