46% of organizations still store passwords in shared documents

46% of IT, security, and cybersecurity leaders say they still store passwords in shared office documents. That’s despite an overwhelming 93% of respondents that require password management training, with 63% holding training more than once per year, ac… Continue reading 46% of organizations still store passwords in shared documents

Good end user passwords begin with a well-enforced password policy

In this interview with Help Net Security, Lori Österholm, CTO at Specops Software, explains what makes passwords vulnerable and suggests some password best practices and policies organizations should implement to keep their systems secure. There’… Continue reading Good end user passwords begin with a well-enforced password policy

55% of people rely on their memory to manage passwords

Bitwarden announced the results of its global password management survey, in advance of World Password Day on May 5th, 2022. While receptive to the importance of security, individuals continue to struggle with embracing password management habits that … Continue reading 55% of people rely on their memory to manage passwords

Mitigating the performance impact of strong hashes with Basic HTTP authentication

I am trying to decide which work factor to use for our hashed passwords, and I am facing the following dilemma. Let me elaborate for a moment.
Basic HTTP authentication works as follows:

The user tries to access a protected resource.
The … Continue reading Mitigating the performance impact of strong hashes with Basic HTTP authentication

Is it possible to design a system with two passwords?

Is it possible to design a system with two passwords prompts?

The system will have to prompt for two passwords
The system would have to validate first password before prompting for second password
User cannot be prompted for second passwo… Continue reading Is it possible to design a system with two passwords?

What security measures does YubiKey take to secure its hardware from malicious firmware tampering? [closed]

We’ve all certainly heard about the widely overhyped BadUSB exploits on the Physon microcontrollers.
There’s certainly a high potential of gaining something by targeting such a specific device, which is designed to only contain secrets.
Ev… Continue reading What security measures does YubiKey take to secure its hardware from malicious firmware tampering? [closed]

How to secure your email via encryption, password management and more

From emailing vendors to communicating with team members, serious business happens in the inbox. That’s why it’s critical to secure it. These TechRepublic Premium resources can help.
The post How to secure your email via encryption, password management… Continue reading How to secure your email via encryption, password management and more