Confessions of a Password Tweaker

Author: 
David Ross

 

I have a confession to make. For over twenty years, I’ve been using the same password for most everything. And the worst part is, I thought I was being smart about it.

RIP IOCs: How Machine Learning will Revolutionize IT Security - Part II

Author: 
David Ross

 

In my last blog post, I sounded the death knell for indicators of compromise (IOCs) — attributes that implicate an item as being associated with cybercrime. IOCs written for one environment rarely transfer into new environments without lots of false positives and false negatives because what’s abnormal (and therefore an IOC) for one system or user might be completely normal for another user or system, or even for the same user at a different time of day.

SC Magazine Market Focus: Moving from MFA to Passwordless

July 2017: SC Magazine’s Market Focus: Another Paradigm Shifts; Multi-Factor (MFA) might soon forgo the password.

In the 2004 action movie National Treasure, Nicolas Cage needs to guess a not-so-complex password and lift a fingerprint in order to break into the National Archives building and steal the Declaration of Independence. Movies often make stealing two-factor authentication so simple, but is it really that easy? And what if the second factor wasn’t a password at all? Could Cage have broken in?

RIP IOCs: How Machine Learning will Revolutionize IT Security - Part I

Author: 
David Ross

 

For over a decade, the security industry has relied on indicators of compromise (IOCs) — attributes that implicate an item as being associated with cybercrime — to spot threats. Since anything observable, such as a file name, a checksum, a registry entry or an email subject line, can be an IOC, IOCs are easy to write, share, and use.

Palo Alto and SecureAuth IdP Integration Brief

This integration brief describes how SecureAuth integrates with Palo Alto Networks GlobalProtect to provide an advanced user authentication solution that goes beyond simple-two-factor to determine identities with confidence.

What You Need to Know about the Australian Privacy Amendment Bill

Author: 
Danielle Jackson, CISO, SecureAuth

 

Countries around the globe are putting policies in place to strengthen security and protect their citizens and business from cyber attacks. These pushes for new regulations are further proof of the increasing concern around the repercussions of data breaches as new high-profile security incidents continue to make headlines.

Pages