Specops Software Blog

Unencrypted biometrics reveal massive risk

Security researchers gained access to more than 27.8 million records, including fingerprints, facial recognition data, usernames and passwords, in the mostly unencrypted and unhashed Biostar 2 database. Biostar 2 is a web-based biometrics locking system used for physical security... Read More

CJIS Password Policy

CJIS Password Policy Requirements

The Criminal Justice Information Services Division (CJIS) is a division of the FBI that provides a number of tools and services to law enforcement agencies around the country. It is also the central repository for Criminal Justice Information (CJI),... Read More

GDPR encryption requirements

Encryption is a necessary component of an organization’s security policy. The GDPR encryption requirements consistently call for "appropriate technical" and "organizational measures." Read More

password length on screen

Password length best practices

A long password is a strong password, however it’s still not any good if it contains your username or other easily guessable words. This blog explains how you can enforce password length alongside other best practices. Read More

desktop screen with lock on it

What is full-disk encryption?

In today’s threat landscape, encryption is a necessary component of an organization’s security policy. Encryption is the process of changing information to make it unreadable by anyone except those possessing special knowledge (commonly referred to as a secret key) that allows them to change the... Read More

specops software logo

Identify and remove leaked passwords

Stockholm, June 25, 2019 – Specops Software announced today a new release of Specops Password Policy. The solution’s downloadable leaked password list with close to one billion passwords, now supports leaked password scanning. The solution enables you to detect... Read More

Specops Software

Self-service encryption key recovery for BitLocker

Stockholm, June 19, 2019 – Specops Software announced today a new release of Specops Key Recovery. The solution now provides self-service key recovery for devices encrypted with BitLocker. This allows users to unlock their devices with multi-factor authentication, without... Read More

How to deploy a MSI package with Group Policy?

Group Policy Software Installation (GPSI) was once hailed as a great incentive for all organizations to upgrade their NT4 domains to Active Directory.  It meant that there was no longer a need for those complex application deployment tools, it... Read More