Authentication

Weighted identities are the future of MFA

There’s a new sheriff in town Allow me to embellish – how else can you describe the sense of security one feels when the words Multi-Factor Authentication (MFA) are uttered. With data breaches, system failures, and identity theft thickening... Read More

3 passphrase best practices

A strong password is long and complex. Adding upper case, numbers, and special characters make it harder to crack. However, considering user behavior, complex passwords have proven too difficult to remember. To cope with complexity requirements, users default to... Read More

Credential stuffing – the password breach aftermath

RIP Passwords – the 2017 Data Breach Industry Forecast by Experian anticipates your demise. Until then, experts are predicting “aftershock” breaches. In 2016, there were 1,093 security incidents involving loss of sensitive data, and three billion credentials stolen worldwide.... Read More

specops software logo

What the password quiz taught us

In celebration of World Password Day we ran a password quiz that presented participants with five pairs of passwords, and asked them to pick out the stronger one from each pair. The results? Only 12% of participants answered all... Read More

Password Strength Meters – more harm than good?

Fact one, passwords are here to stay, at least for the near future. Fact two, users have not gotten any better at making them stronger, or using additional factors during authentication. To help users with this seemingly impossible task,... Read More

Finding your identity in the digital space

Don’t let the title fool you. This is not so much a melodrama – but rather about our fragmented identities sprinkled in the ubiquitous digital space. Okay, maybe a little exaggerated, but let’s see how you feel after a... Read More

claims-based identity management

Claims-Based Identity: A Better Model for Authentication

Claims-based identity is a common method used by applications to obtain identity information about a user that another application has authenticated. Claims are pieces of information about a user that have been packaged and signed into security tokens and... Read More