Encryption vs. hashing: Learning from Adobe's password breach

Password Management and Policy

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to break into a computer that is right at your fingertips

    Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer. 

  • Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. 

  • Encryption and password protection methods for removable storage devices

    In this Ask the Expert Q&A our platform security expert explains how to use encryption and passwords to secure removable storage devices. 

  • Cracking smaller messages

    Learn whether or not a smaller message is easier to crack and how encryption makes plaintext plausible. Also learn how to encrypt a message and why you should consider using a smaller key. 

  • Symantec glitch could expose user names, passwords

    Symantec announced a fix for a flaw in AntiVirus Corporate Edition Friday afternoon. The security hole could be exploited to view user names and passwords. 

  • SAP Security Learning Guide

    This guide pulls SAP security information from both SearchSecurity.com and its sister site, SearchSAP.com, to provide the most comprehensive resource around for all aspects of making your SAP system bulletproof. 

  • Review: Should you pass up this password management system?

    After initial glitches, the appliance comes through when it comes to meeting steep challenges. 

  • The latest play on passwords

    A new survey of Fortune 2000 companies and government agencies suggests stronger authentication is not being widely embraced because of complexity and costs. 

  • Sun converts Web SSO authentication to open source

    In announcing a new push into identity management, Sun Microsystems today turned over its code for Open Source Web Single Sign-On to improve its use and accessibility. 

  • Interview: Setting policy the IBM way

    Last week IBM announced its new Data Governance Council, formalizing a group of enterprises and IT organizations that have been meeting quarterly for more than a year to discuss ways of better protecting data against online thieves. Council member...