+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Passwords and Authentication’

How to Crack an Active Directory Password in 5 Minutes or Less

October 12th, 2017

Guest column by Semperis. Author: Noa Arias, Director of Marketing at Semperis The massive Equifax data breach compromised sensitive information for roughly 143MM people and is a sobering reminder that security flaws still exist in most organizations. The fact is that most enterprises use Active Directory as the cornerstone of their IT systems and, while AD can…


Cyber Security Awareness Month: 6 Simple Steps to Online Safety

October 3rd, 2017

Why do we continue to see so many cyber breaches in spite of our heightened awareness?  When we examine why many of the breaches in recent years have occurred, we can identify three major culprits: the Human Factor, Identities and Credentials, and Vulnerabilities. As a digital social society we are sharing more information publicly, causing…


Top 5 privileged account security reports CISOs must have: What Privileged Account passwords are expiring this week?

August 31st, 2017

How do you know when a password is about to be changed according to an assigned password rotation interval? Or when a privileged account or any other item stored within your privileged account management tool is reaching the end of its validation period and needs to be renewed? In this exclusive 5-part Thycotic educational series…


Passwords and Biometrics. Can they coexist, and should they?

August 23rd, 2017

The vision of a biometrics-led future for IT security is breathtaking, but is there a place in the future for passwords? Or are passwords ancient history? Passwords Need Better Management, Not Replacement Forget your passwords. They’re ancient history. That’s the message you’ll increasingly see if you keep up with the latest developments in security. But…


What is Biometric Authentication?

August 8th, 2017

Bio authentication, or biometric authentication, is a method of authentication (proving you are who you say you are) based on something biological to the human being.  Biometric authentication is another form of multi-factor authentication (providing several separate pieces of evidence proving who you are), and can be used in conjunction with another form of authentication,…


The Pros and Cons of Frequent Password Rotation

May 31st, 2017

What this title really should say is “the cons and cons of frequent manual password rotation”.  To be honest, I can’t think of a single good reason why anyone should be subjected to frequent manual password rotations.  There is nothing about that concept that screams “Good Idea”. Now, before you run off let me explain.…


5 Shocking Insights into the Social Network Habits of Security Professionals [And Infographic]

May 30th, 2017

It may come to a shock for some of you, but not all security professionals practice what they preach. In a recent survey, the “real” truth came to light around cyber security professionals and their security habits around social media usage. Hacking social media accounts has never been easier. Attackers take advantage of poor password…


Part 1: How did my password get hacked? It’s simple…

May 11th, 2017

I wish that we could tell you that the reason your password and account were hacked was due to some really high tech and sophisticated character in a dark room lit only by a giant panel of computer monitors.  Just like you see on your favorite TV show.  Unfortunately, this isn’t the case. It’s not…


The Password Love Affair: Would you share your password with your partner?

February 14th, 2017

Passwords, for many people and companies, are one of the vital security controls that protect us from external hackers and cyber threats. Passwords are part of everyday life and protect our privacy and sensitive information from unauthorized access. Every day billions of people power up their devices and connect to the internet to access online…


10 Tips to begin 2017 as a Secure Enterprise

January 5th, 2017

Cyber Security is a very hot topic and with more than 3.5 billion Internet users worldwide, That includes, 6 billion email accounts, 2 billion smartphones, 1 billion apple users, 1 billion Gmail accounts, 1.7 billion Facebook accounts, and 300 million Twitter accounts who tweet 7,350 times per second, send 2.5 million emails per second, and…