Encryption vs. hashing: Learning from Adobe's password breach

Password Management and Policy

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Case study: L.A. health alerts don't miss a beat

    Los Angeles County Department of Health Services bioterrorism IT coordinator David Cardenas fields and distributes about a dozen serious health alerts to physicians, hospitals and response agencies and must ensure the flow of such sensitive informati... 

  • Password protection no match for Easter egg lovers

    Next time you want to compromise a network, forget launching malicious code to gain root access. Just offer an office worker chocolate. 

  • Solaris flaw in passwd command allows root privileges

    Solaris administrators will need to apply patches to seal a vulnerability in the operating system that could let a local user gain root privileges. 

  • Survey: Most workers must remember six passwords or more

    A recent SearchSecurity.com poll found that nearly 80% of respondents have to remember six or more passwords to do their jobs. 

  • Quick Takes: Sun partners on identity management, provisioning

    Sun and Thor Technologies announced that Thor's enterprise provisioning system will be integrated into the Sun ONE identity management platform, leading off Quick Takes. 

  • Are passwords passe?

    Security experts, including one presenting at next week's RSA Conference 2003, suggest that passwords are not as secure as enterprises may believe. 

  • Quick Takes: Password management made easy

    Quick Takes: Password management made easy 

  • 3. Passwords

    Weak passwords are an administrative and security nightmare. In this Featured Topic, we provide you with guidelines for creating obscure passwords your users will actually use and tips for implementing a password policy.