As organizations move data to the cloud, strong password policies have never been more important. Here is how to use the on-premises Active Directory to enforce password complexity in O365. Read More
Specops Software Blog
Specops Software acquired by Monterro
Stockholm, August 21, 2019 – Specops Software is excited to announce that the equity investment firm, Monterro has become the majority owner of Specops Software. Specops Software and Monterro jointly see the acquisition as a great opportunity for accelerated... Read More
Unencrypted biometrics reveal massive risk
Security researchers gained access to more than 27.8 million records, including fingerprints, facial recognition data, usernames and passwords, in the mostly unencrypted and unhashed Biostar 2 database. Biostar 2 is a web-based biometrics locking system used for physical security... Read More
CJIS Password Policy Requirements
The Criminal Justice Information Services Division (CJIS) is a division of the FBI that provides a number of tools and services to law enforcement agencies around the country. It is also the central repository for Criminal Justice Information (CJI),... Read More
GDPR encryption requirements
Encryption is a necessary component of an organization’s security policy. The GDPR encryption requirements consistently call for "appropriate technical" and "organizational measures." Read More
Password length best practices
A long password is a strong password, however it’s still not any good if it contains your username or other easily guessable words. This blog explains how you can enforce password length alongside other best practices. Read More
What is full-disk encryption?
In today’s threat landscape, encryption is a necessary component of an organization’s security policy. Encryption is the process of changing information to make it unreadable by anyone except those possessing special knowledge (commonly referred to as a secret key) that allows them to change the... Read More
Active directory password audit best practices
This blog describes how you might audit active directory passwords to check that no weak, easy-to-guess, or known leaked passwords are being used in your organization. Read More
Identify and remove leaked passwords
Stockholm, June 25, 2019 – Specops Software announced today a new release of Specops Password Policy. The solution’s downloadable leaked password list with close to one billion passwords, now supports leaked password scanning. The solution enables you to detect... Read More
Self-service encryption key recovery for BitLocker
Stockholm, June 19, 2019 – Specops Software announced today a new release of Specops Key Recovery. The solution now provides self-service key recovery for devices encrypted with BitLocker. This allows users to unlock their devices with multi-factor authentication, without... Read More