Password authentication News
September 25, 2015
News roundup: More fingerprint records were stolen during the OPM breach than originally reported. Plus: the $1 million iOS bounty; DHS CISO calls for harsher phishing policies; Safe Harbor in hot water.
August 13, 2015
Bitdefender suffered a data breach in which a hacker stole a small number of unencrypted usernames and passwords for active customers. The hacker then demanded $15,000 in ransom.
July 27, 2015
A glaring error in the Steam password recovery system allowed hackers to take over accounts for Valve's popular gaming platform.
June 30, 2015
A report reveals that many stolen US government agency passwords traveled across the Web, including credentials from OPM, which was recently breached due to stolen passwords.
Password authentication Get Started
Bring yourself up to speed with our introductory content
Managing public/private keys is crucial for enterprises to ensure secure cloud authentication. Here are four tips to harden security of cloud keys. Continue Reading
Admins with an Azure subscription can use Azure Key Vault to protect and encrypt keys and data. Here's how to set it up with PowerShell. Continue Reading
Using passwords to authenticate users has a long and troubled past. Expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help solve the woes surrounding user authentication in the cloud. Continue Reading
Evaluate Password authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Global threat intelligence services can be part of your security arsenal, but to prevent phishing and other threats basic defenses like strong passwords are vital too. Continue Reading
Biometrics and multifactor authentication in Windows 10 make it easier and more secure for users to access the resources they need. Continue Reading
Weak passwords are a common threat to enterprises relying on cloud services. Expert Dejan Lukan reviews some password best practices. Continue Reading
Manage Password authentication
Learn to apply best practices and optimize your operations.
With AirWatch by VMware, IT can manage Office365 applications on users’ mobile devices – all the while making sure those apps are secure. Continue Reading
Make sure your comprehensive security design also includes an incident policy to help react to an online security breach. Continue Reading
In this guide, find advice on using Excel for corporate finance, as well as an overview of trends that are shifting companies away from spreadsheets. Continue Reading
Problem Solve Password authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
By using the .NET WebClient class and PowerShell, Windows admins can upload and download files to FTP. Continue Reading
Point-of-sale malware, such as the recent PoSeidon malware, continues to evolve to avoid detection. So what's an enterprise to do? Expert Nick Lewis explains how the malware functions and what organizations can do about it. Continue Reading
A variant of the Citadel malware emerged that compromises password management and authentication products. Enterprise threats expert Nick Lewis explains how to prevent and overcome the threat. Continue Reading