brandon lee writer

Brandon Lee

Networking
Storage
Virtualization

Brandon Lee has been in the industry 20+ years, is a prolific blogger focusing on networking, virtualization, storage, security & cloud, and contributes to the community through various blog posts and technical documentation primarily at Virtualizationhowto.com.

Articles written by Brandon Lee

  • password reset button on keyboard

    Are password reset solutions still relevant?

    In case you haven’t been keeping up with the latest password guidance from noted cybersecurity organizations, it has changed from the traditional advice given regarding password security and password security policies. There are new and better ways to protect and secure account passwords than legacy…

    Read More
  • password length on screen

    What is the NCSC guidance on password managers?

    To keep our accounts secure across the multiple services that we use, we need to choose strong passwords that are unique for each account or service. Yet, 52% of people reuse the same password for multiple accounts.   Remembering multiple strong passwords for perhaps dozens of accounts is…

    Read More
  • NIST password standards

    What is the NIST guidance on password managers?

    Today’s end-users are juggling many sets of credentials for accessing critical business resources. To prevent users from writing-down, reusing, or selecting weak but memorable passwords, businesses are turning to password managers. A password manager is an encrypted database used for storing, retrieving, and generating passwords. Enterprise password managers not only improve password security, but also simplify password management for…

    Read More
  • How to check if an Active Directory account is locked out

    You might want to check if an Active Directory account is locked out to ensure that users can access necessary resources, to troubleshoot login issues, and to maintain security by identifying potential brute-force attack attempts. Being able to quickly and…

    Read More
  • Password policy enforcement

    German Federal Office for Information Security password guidance

    The German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, abbreviated as BSI) is an agency responsible for information security for the German federal government. The BSI is also the central certification body for IT systems. This…

    Read More
  • specops password auditor interface

    CNIL password guidance

    Data privacy has become a priority for global businesses due to sweeping regulations such as the General Data Protection Regulation (GDPR). At the same time, other regulatory bodies continue to enforce local data privacy laws. In France, for example, the…

    Read More
  • Programming your own password filter .dll

    Organizations can increase the security of Active Directory passwords by filtering specific passwords from being used in their environment. Password filters help bolster the security protections of Active Directory Password Policy settings by ensuring that end-users cannot use passwords that…

    Read More
  • password reset button on keyboard

    NIST Password Reset Guidelines

    Passwords are necessary for authentication to different types of technology systems used in businesses today. Yet, they are a dangerous form of information from a security perspective. To strengthen password security, organizations want to take note of password best practices…

    Read More
  • What is the California default password law?

    Passwords have become a subject of scrutiny, not only in IT security operations, but even extending out into new legislative mandates that have brought passwords into clear focus. California's Senate Bill 327 (SB-327) was enacted in 2018 and became effective…

    Read More
  • Active Directory Password Hash

    How to change the Active Directory password hash method

    Passwords are generally associated with all aspects of securing technology systems. In most environments, passwords are secured using a password hash. Password hashes can impact how vulnerable an organization's passwords are to an attacker, or in a data leak that may…

    Read More