Contest aims to boost state of password encryption
Passwords are the most widely used security mechanism on the Web, so beefing up hashing algorithms, utilized to protect them, is important
Antone Gonsalves | 15 Feb | Read more
Passwords are the most widely used security mechanism on the Web, so beefing up hashing algorithms, utilized to protect them, is important
Antone Gonsalves | 15 Feb | Read more
Education on the proper use of certificates is needed in the industry, analyst says
Antone Gonsalves | 15 Feb | Read more
FIDO Alliance, DARPA vow to create better authentication, but new systems will have to attract users and providers, say security pros
Taylor Armerding | 14 Feb | Read more
Aptly named, a company's help desk is primarily focused on resolving technology issues so the business as a whole can function successfully. Despite the best of intentions, however, help desks can put the company at risk by using legacy tools, shared passwords and incomplete security practices.
Bryan Hood, solution engineer for remote support software provider Bomgar | 08 Feb | Read more
While passwords security is not ironclad, experts say they need to be in the mix with device-assisted authentication as an additional layer
Antone Gonsalves | 19 Jan | Read more
Tragedy shouldn't undermine protection of private and public property, experts say
Taylor Armerding | 18 Jan | Read more
Verizon report recommends 'least privilege management,' a decades old concept. Problem is, it's still not mainstream.
Taylor Armerding | 16 Jan | Read more
Do chief information security officers (CISOs) in North America work harder than their security counterparts in Europe?
Ellen Messmer | 15 Jan | Read more
FAA says it can spot hacking attempts, but won't allow independent 'stress tests'
Taylor Armerding | 11 Jan | Read more
Yahoo has started providing webmail users the option of using a secure connection, matching a similar feature Google and Microsoft have offered for several years.
Antone Gonsalves | 09 Jan | Read more
Employers in Illinois and California cannot ask for usernames and passwords to the personal social media accounts of employees and job seekers under laws that took effect on Jan. 1.
Jaikumar Vijayan | 04 Jan | Read more
Effective identity management is essential to security, regulatory compliance and in some cases even business success. So why is it still so hard for many companies?
George V. Hulme | 18 Dec | Read more
It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.
John Stewart, senior vice president and chief security officer, Cisco | 13 Dec | Read more
Antivirus pioneer John McAfee could soon be released from detention in Guatemala where he is being held on charges that he entered the country illegally in an attempt to escape authorities in Belize where he is wanted for questioning in a murder case.
Jaikumar Vijayan | 12 Dec | Read more
Amazon Web Services today launched Data Pipeline, a new tool designed to make it easier for users to integrate data stored in multiple disparate spots to manage and analyze it.
Brandon Butler | 30 Nov | Read more