Password management and policy
Discover how to succeed in password management. Learn how to implement a password policy, software and tools, how to choose the right password length and when to change your password. Also, get advice on password cracking software, tools and programs.
New & Notable



Your Guide to Info Sec Certifications
We’ve collected 30+ certifications for you. Which vendor-neutral and vendor-specific security certifications are best for you? Save time by downloading our list organized by experience level.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Password management and policy News
-
March 21, 2018
21
Mar'18
Firefox bug exposes passwords to brute force -- for nine years
A Firefox bug exposing the browser's master password to a simple brute force attack against inadequate SHA-1 hashing is still on the books after nearly nine years.
-
December 29, 2017
29
Dec'17
Browser login managers allow tracking scripts to steal credentials
News roundup: Login managers enable the exposure of user credentials in over 1,000 websites. Plus, Mozilla patched a critical vulnerability in Thunderbird, and more.
-
December 12, 2017
12
Dec'17
1.4 billion stolen credentials found on dark web
A massive repository containing more than 1.4 billion stolen credentials was found on the dark web with special features for malicious actors.
-
January 12, 2017
12
Jan'17
Risk & Repeat: CES Cybersecurity Forum tackles passwords, IoT
In this episode of SearchSecurity's Risk & Repeat podcast, editors highlight the topics discussed at the CES Cybersecurity Forum, as well as new technologies showcased at the event.
Password management and policy Get Started
Bring yourself up to speed with our introductory content
-
CISSP Domain 5: Cloud identity management and access control
From cloud identity and access management to physical access control, this study guide will help you review key concepts from Domain 5 of the CISSP exam. Continue Reading
-
Identity and access management in the cloud: Risk or reward?
In this video, expert Adam Gordon explains the implications of using identity and access management in the cloud as well as opportunities the model offers. Continue Reading
-
How to set up two-factor authentication for enterprise users
The old username/password combination is not the safest form of ID management. See why two-factor authentication belongs in IT's mobile security arsenal and learn how to set it up. Continue Reading
Evaluate Password management and policy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Social cybersecurity: Influence people, make friends and keep them safe
Jason Hong talks about Carnegie Mellon's work in social cybersecurity, a new discipline that uses techniques from social psychology to improve our ability to be secure online. Continue Reading
-
Salesforce partner integration enables passwordless login
Tempe's private tech university added passwordless authentication via QR codes to ease Salesforce logins and add a layer of security. Continue Reading
-
FIDO authentication standard could signal the passing of passwords
The FIDO authentication standard could eventually bypass passwords, or at least augment them, as government and industry turns to more effective authentication technologies. Continue Reading
Manage Password management and policy
Learn to apply best practices and optimize your operations.
-
Say hello to the future of authentication, bye to passwords
Passwords and tokens are a thing of the past. No way, you say? Our webcast on the likely ways authentication will work in the future may make a believer out of you. Continue Reading
-
How should security teams handle the Onliner spambot leak?
A security researcher recently discovered a list of 711 million records used by the Onliner spambot. Expert Matt Pascucci explains what actions exposed individuals should take. Continue Reading
-
Microsoft LAPS locks down local admin passwords
Using the same local admin password is convenient, but risky. It gives attackers limitless access across the machines on the domain. Microsoft has a tool to boost login security. Continue Reading
Problem Solve Password management and policy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Imran Awan case shows lax security controls for IT staff
Investigations into the conduct of the IT staff of the House of Representatives raised alarms. Kevin McDonald explains what we can learn from the case of Imran Awan. Continue Reading
-
Cryptographic keys: Your password's replacement is here
As passwords become targets of phishing attacks, password management has become increasingly difficult. Expert Nick Lewis explains how cryptographic keys could replace passwords. Continue Reading
-
Recover an ESXi root password for stand-alone and vCenter hosts
A forgotten ESXi root password can stop you in your tracks. Avoid dodgy quick fixes and learn the proper way to recover a root password for vCenter-connected and stand-alone hosts. Continue Reading