Encryption vs. hashing: Learning from Adobe's password breach

Password Management and Policy

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security360: Identity management market

    Analyst Mark Diodati describes the leaders of the identity management market; IBM's Joe Anthony explains Big Blue's strategy and Novell's Dale Olds on user-centric identity. 

  • Survey finds access control problems at many firms

    Despite the growing data breach threat as a result of trusted insiders, many firms are failing to implement a strong access governance program, according to a recent survey. 

  • IBM releases simplified Tivoli Identity Manager

    Big Blue is melding automated features from its lightweight Express version in what it says should simplify deployments and ease end user pain. 

  • Top 10 access-related controls for PCI compliance

    Companies that identify, monitor, report and investigate audit trails and conduct risk analytics are taking the right steps to protect critical data, according to one expert. 

  • IBM aims identity suite at compliance, audit pains

    IBM has been on a shopping spree over the last several years to beef up its Tivoli identity and access management suite. Over the summer, Big Blue rolled out the results of its acquisition with Consul Risk Management, launching the Tivoli Compliance ... 

  • Database authentication, encryption getting priority in some businesses

    While more organizations are seeking database authentication and encryption technologies, others are turning to database monitoring to secure data. 

  • Review: Sun Java System Identity Manager 7.0 'impressive'

    Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing. 

  • Gates touts secure access anywhere

    Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof. 

  • Firefox, IE flaw could expose passwords

    A flaw in Firefox 2.0 and IE could affect anyone visiting a Web site that allows user-contributed HTML codes to be added, according to Chapin Information Services. 

  • Looking ahead to life without passwords

    Security pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to stronger authentication.