Encryption vs. hashing: Learning from Adobe's password breach

Password Management and Policy

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Inside the numbers: Access (out of) control?

    In April, SearchSecurity.com surveyed 358 IT professionals from a variety of industries regarding their identity and access management programs. Here is a look at some of the questions we asked and the answers they gave. 

  • Security Bytes: Massive fraud via Web payment site

    McAfee fixes Webshield flaw, Trend Micro data is compromised; and Apple fixes its Mac OS X firmware. 

  • Maturing federated ID market shows security promise

    Until recently, investing in an federated identity management product didn't always make sense, as the technology was hardly mature enough for enterprise-wide adoption. These days, vendors small and large have viable products to fill all sorts of nee... 

  • Jelly Belly sweetens remote access

    Candy-maker Jelly Belly's network was so secure even top executives couldn't get in through the VPN. The company solved the sticky situation with innovative new appliances. 

  • Scientists band together for TRUST-worthy research

    A group of the nation's top computer scientists and colleges are teaming up to find better ways to protect computing systems from cyberattacks. 

  • Yahoo fixes SSL flaw in Business E-mail

    The company made adjustments to the program after a security expert discovered user IDs and passwords were being transmitted in plaintext.
    Editor's note: This article now includes Yahoo's e-mail address through which security issues can be re... 

  • Gates calls for the end of passwords

    Microsoft's chairman outlined a future where code is written more securely and passwords are no more. Can his company get us there? 

  • FTC promotes ID theft awareness

    The government's new quiz aims to highlight the growing problem, but the latest data suggests many consumers still fail to protect their identity. 

  • Passwords still the weakest link

    But more software is beginning to keep insiders from using shared or administrative passwords to access restricted data files, helping to ensure SOX compliance. 

  • Review: With ID-Synch v4.0, you can easily manage many users

    HOT PICK: Security is enhanced through ID-Synch's ability to enforce strong password policy across platforms. But that's not the only benefit.