RIP Passwords – the 2017 Data Breach Industry Forecast by Experian anticipates your demise. Until then, experts are predicting “aftershock” breaches. In 2016, there were 1,093 security incidents involving loss of sensitive data, and three billion credentials stolen worldwide.... Read More
Authentication
Password Strength Meters – more harm than good?
Fact one, passwords are here to stay, at least for the near future. Fact two, users have not gotten any better at making them stronger, or using additional factors during authentication. To help users with this seemingly impossible task,... Read More
Configuring Chrome and Firefox for Windows Integrated Authentication
Windows Integrated Authentication (WIA) comes as standard with Microsoft’s own internet browsers. However, you may want the benefits that comes with it while using the internet browser of your own choosing. Thankfully you can still get the benefits of... Read More
“123456” and “password” continue to be the most commonly used passwords, when will people learn?
Teampassword published a list of the top 25 most common passwords of 2016. Your policy may not allow weak passwords such as 123456 or password, but even if the password complexity requirement is enabled in the standard Windows Password... Read More
Claims-Based Identity: A Better Model for Authentication
Claims-based identity is a common method used by applications to obtain identity information about a user that another application has authenticated. Claims are pieces of information about a user that have been packaged and signed into security tokens and... Read More
Using claims-based identity to achieve multi-factor authentication
Claims-based identity in real life The claims-based identity model is a secure way to authenticate users for access but understanding how the trust relationship works is key. Instead of jumping into claims, security tokens and Identity Providers let’s talk... Read More