July 2019 marked the passing of respected computer pioneer, Fernando Corbato, aged 93, who had a long and illustrious career in technology leaving many great legacies to the field of technology, including 50 years of passwords. Inventor of the password Dr Corbato is perhaps most famous for inventing the password. But this invention was actually..
Passwords, 2-factor authentication, multi-factor authentication – do you need to know what they mean? Or are we now entering the realm of x-factor authentication where the method used is essentially transparent to the user? Whichever authentication method is implemented, the focus has to be to ensure that it is fully compliant and that x-factor authentication..
In our latest article we look at how deviceless authentication can be effective at combating password breaches. For decades now, organisations, platforms and users have relied on passwords for security. The password has been entrusted as the gatekeeper, the single solution to keep information safe and solely in the hands of those with the code..
The enterprise IT environment of today couldn’t be more different from that of a decade ago. From cloud computing and AI to automation and VR, a host of advanced technologies are changing the way we work and network. And it’s not just enterprises that are getting more sophisticated: so too are cybercriminals. Instances of cybercrime..
We are starting the new year with a new release of our Authentication Server Suite. This release focuses on four main areas to add value to customers: user self-service, hardware tokens, choosing passwords and auditing. Updates to Password Policy Agent and Windows Desktop Logon Agent are also included to round off this release. Brand new..
Earlier this week the Daily Mail published a story with the headline ‘How to create a password that will take a hacker 227 MILLION years to crack – and the UK’s top 10 can be deciphered in less than a second’. The list of vulnerable passwords offers no surprises, so how do you create an..
Every time a data breach hits the headlines it is accompanied with calls for organisations to find ways to better manage passwords, misguided advice on how to make them stronger, or suggestions for alternatives. The move away from password-based login credentials is for most (whether consumer or corporate) the goal, but there needs to be..
You may not be familiar with Bill Burr, but chances are he has had an impact on your day today. His guidelines for password security are the reason that in all probability you are adding an exclamation mark to the end of your memorable (or in reality, not so memorable) ‘secret’. The crazy thing is..
A new online advertisement from Barclays demonstrates just how easy it can be for a fraudster to call a customer and get them to divulge their security information. I defy a customer of any bank to watch this video and not think twice the next time they receive a call from someone claiming to be..
Over the weekend it was widely reported that the approx. 90 email accounts in the UK Parliament had been compromised, in a brute force attack that looked to exploit accounts ‘protected’ by weak passwords, an example of which might be Westminster123 or JohnSmithMP! According to reports, these 90 accounts represent less than 1% of the..