Apache Software Foundation issued an emergency update for a critical zero-day vulnerability on December 9, 2021. The vulnerability affects open source logging tool Log4j included in almost every Java application. Specops has reviewed our products and there is no... Read More
Specops Software Blog
Password Policy Compliance Report in Specops Password Auditor
Organizations looking to evaluate how well their existing password policies measure up against different compliance standards may benefit from running a free scan with Specops Password Auditor. One of the reports Password Auditor provides is the Password Policy Compliance report.... Read More
What is Gramm-Leach Bliley Act (GLBA)?
The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, requires financial institutions to explain their information-sharing practices to their customers, and to safeguard sensitive data. The GLBA applies to all companies that offer consumer financial products or services like loans, financial or investment advice, or... Read More
CIS Benchmark Password Policy
With technology constantly evolving, cybersecurity organizations are helping people, businesses, and governments with best practices to protect themselves against emerging threats. The Center for Internet Security (CIS) is one of these advisement groups. The CIS Controls and CIS Benchmarks provide globally recognized best practices for security IT systems and... Read More
“Who you gonna call?” About these compromised passwords [new data]
If your colleagues are Ghostbuster fans, they might be at risk for compromised password use. Ahead of the upcoming Ghostbusters: Afterlife movie release, Specops Software investigated which Ghostbuster-themed passwords were most popular in compromised password lists. This analysis coincides... Read More
Protecting Your Organization Against the Nobelium Attacks
The UK’s National Cyber Security Centre has recently issued guidance to organizations in response to a series of attacks. This guidance was released following a notification in which Microsoft indicated that it had identified new activity tied to an... Read More
Outpost24 acquires Specops for enhanced user security and secures further funding to continue growth
STOCKHOLM, November 4, 2021 – Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the acquisition of Specops Software, a leading provider of password management and user authentication solution, as well as securing another SEK 50 million... Read More
Top 5 Hacker Groups and their Attacks
One of the frightening cybersecurity risks for businesses today is undoubtedly ransomware. It doesn’t discriminate and leaves in its wake encrypted, unreadable files, threats of data leaks, and often millions of dollars in damages. Moreover, large-scale and sophisticated ransomware... Read More
What metrics should sysadmins use to show improvement over time?
To illustrate how essential IT systems are to the proper functioning of the business, system administrators should use a number of metrics to communicate key KPIs with non-technical leadership. This can help justify the overall budget of the IT department, as well as the... Read More
Death of the password? It’s only 60!
We marked our calendars, counting down the months, days, and minutes. Now, the day we’ve all been waiting for is here: the 60th anniversary of the computer password! Since its beginning in an MIT lab in the fall of... Read More