Encryption vs. hashing: Learning from Adobe's password breach

Password Management and Policy

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Be afraid of the catastrophic data breach

    Though stories on the latest data breaches seem to pass through the headlines in the blink of an eye, experts warn that the loss or exposure of customer data can have long-lasting consequences. In fact, just one such incident can bring an enterprise ... 

  • Putting password security in users' hands

    More PCs are being shipped with multi-authentication capabilities. But does it matter so long as Windows lets you store all your passwords on your hard drive? 

  • Symantec glitch could expose user names, passwords

    Symantec announced a fix for a flaw in AntiVirus Corporate Edition Friday afternoon. The security hole could be exploited to view user names and passwords. 

  • Review: Should you pass up this password management system?

    After initial glitches, the appliance comes through when it comes to meeting steep challenges. 

  • The latest play on passwords

    A new survey of Fortune 2000 companies and government agencies suggests stronger authentication is not being widely embraced because of complexity and costs. 

  • Sun converts Web SSO authentication to open source

    In announcing a new push into identity management, Sun Microsystems today turned over its code for Open Source Web Single Sign-On to improve its use and accessibility. 

  • Interview: Setting policy the IBM way

    Last week IBM announced its new Data Governance Council, formalizing a group of enterprises and IT organizations that have been meeting quarterly for more than a year to discuss ways of better protecting data against online thieves. Council member... 

  • Fixes, workaround for Kerberos 5 vulnerability

    A security hole could be exploited to launch malicious code. But there are fixes and a workaround. 

  • A security challenge for academia

    Academic institutions face a challenge from students and faculty whose laptops and PCs may be loaded with undetected malware. 

  • Graphical passwords still far from picture perfect

    The proliferation of data and devices is making more enterprises consider graphics-based authentication, from which arises a greater pool of possibilities -- and problems.