Email Alerts
-
Recovering lost passwords with Cain & Abel
In his latest screencast, Peter Giannoulis of The AcademyPro.com demonstrates how to use the Cain & Abel tool to decipher or track down lost passwords.. Tip
-
Identity and access management 2009: Staff cuts, insider threats
Identity and access management in 2009 will be drastically different from 2008, most notably because staff reductions may result in a new crop of malicious attackers. In this tip, David Griffeth explains how to deal with growing outsider and insider ... Tip
-
ID and password authentication: Keeping data safe with management and policies
Learn how to improve authentication and avoid password hacking with management policies that enforce password expiration, length and complexity requirements. Tip
-
Trends in enterprise identity and access management
The market for identity and access management (IAM) products is growing rapidly to meet varied business and compliance demands. What trends -- good and bad -- are on the horizon? IAM expert Joel Dubin offers a guide to the products that are moving th... Tip
-
Screencast: An introduction to the Open Source Security Testing Methodology Manual (OSSTMM)
Watch Peter Giannoulis as he introduces the Open Source Security Testing Methodology Manual (OSSTMM)and demonstrates how it can be used to defend machines from a brute-force dictionary attack. Tip
-
Ophcrack: Password cracking made easy
Scott Sidel examines the open source security tool Ophcrack, a password cracking tool aimed at ensuring the strength of corporate passwords. Tip
-
Worst Practices: Three big identity and access management mistakes
Simple IAM mistakes such as writing down passwords and unaudited user accounts can allow malicious access into corporate networks. In this tip, contributor Joel Dubin exposes the most common identity management and access control blunders, and enligh... Tip
-
Complex password compliance requirements made simple
In order to comply with a number of well-known industry regulations, it's necessary for enterprises to have stringent password management requirements in place. In this tip, expert Joel Dubin reviews the password requirements put forth by key complia... Tip
-
Adding 'fudge' to your passwords
Many end users easily have half a dozen passwords to access the various Web apps they need to do their jobs. With this tip, you can enforce strong password policies -- and allow your users to write down their passwords. Tip
-
Creating secure passwords you don't have to remember
It's easy to tell users to create strong passwords, but hard to get them to do it. And when they do, it's common to see them written on a sticky note attached to someone's monitor. So what's the answer? It might be an online application that promises... Tip
Security Management Strategies for the CIO