Encryption vs. hashing: Learning from Adobe's password breach

Password Management and Policy

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to convince executives to use stronger passwords

    In this Ask the Expert Q&A, Shon Harris discusses tools and tactics you can use to convince exectuives that there is a need for stronger passwords within an organization. 

  • Synching passwords between an iSeries and Windows network

    Learn whether it is possible to synch passwords between an iSeries and a Windows network, and, if there a way to synch password between multiple iSeries, in this Ask the Expert Q&A. 

  • Changing user IDs and passwords

    Learn why organizations should limit the number of username changes in this identity and access management ATE Q&A. 

  • Step-by-step guide: Cracking network passwords

    Mitigate the risks posed by weak passwords by attempting to find your weaknesses before a malicious hacker does. Contributor Kevin Beaver provides a step-by-step guide on how to crack your own network passwords. 

  • Best practices for password protection

    Learn what a keyring is -- how it works in conjuction with passphrases to keep sensitive and personal messages secure. Also learn what practices help keep passwords protected from hackers and crackers. 

  • How to create stronger passwords

    Learn how password crackers work, six ways you can create stronger passwords and two ways you can avoid the risks of password cracking. 

  • Be afraid of the catastrophic data breach

    Though stories on the latest data breaches seem to pass through the headlines in the blink of an eye, experts warn that the loss or exposure of customer data can have long-lasting consequences. In fact, just one such incident can bring an enterprise ... 

  • How an attacker cracks a symmetric key-based system

    Learn how an attacker cracks a symmetric key-based system. 

  • How to create a secure password system

    In this Ask the Expert Q&A, Joel Dubin examines the security risks associated with using a password system that includes employee identifiers. 

  • Putting password security in users' hands

    More PCs are being shipped with multi-authentication capabilities. But does it matter so long as Windows lets you store all your passwords on your hard drive?