Here at Authlogics, we’re extremely privileged to have access to a cache of password-related data. The Password Breach Database is a treasure trove for security analysis, allowing us to use the 1 billion unique clear text passwords to develop trends and patterns found in data breaches that have exposed passwords, allowing us to make inferences..
Internet websites such as techradar.com and cybernews.com have been reporting that RockYou2021 is the largest password breach ever released, even comparing it to the Compilation of Many Breaches (COMB) breach collection we reported on earlier this year. Headlines include the fact that RockYou2021 has more than twice as many passwords (8 billion) compared to COMB (3.2 billion)…
The future of passwords is under the spotlight at present. The discussion to remove and replace them with alternative authentication methods is being addressed in many virtual boardrooms around the world with the need to migrate towards passwordless authentication. As password-related breaches become more common (SolarWinds and Cit0Day) and bigger (COMB), it is becoming more..
No-one could have predicted how 2020 was going to pan out when we welcomed the new year in all those months ago before lockdowns and remote working were part of our daily setup for this year. Many industries have struggled throughout but the technology sector and in particular cybersecurity have never been so busy (well..
Protect yourself, protect your organization, protect your Active Directory With everyone working at home and IT policies under scrutiny as cyberattacks are on the rise, how do you ensure your Active Directory is secure? Time to do an audit to find out! Remote working is key to keeping organizations functional but it can also be..
In his latest video blog, Global Account Manager at Authlogics, Kamber Devjianie, explains why organisations still reliant on hard-tokens as part of their multi-factor authentication strategy need to seriously re-evaluate their usage, in light of the tried and test soft-token alternatives, which can work as part of a 1.5FA, 2FA and 3FA solution. He explains how..
Last week I posted a video explaining Authlogics approach to 1.5FA. This week, I want to talk about 3FA which is an extension of 2FA (something you have and something you know) by the addition of something you are doing that is specific to a task, typically known in the industry as transaction signing.
Way back in December 2012, I met with a journalist in London to introduce the concept of 1.5FA. Roll forward four years and I find myself still having similar conversations. Organisations are desperately looking for a more flexible approach to how they deploy authentication. There are instances where 2FA and 3FA are a requirement (it may be..
How you manage the public fall-out from a cyberattack is in many respects just as important as how it is being dealt with internally. Whist, at the time of writing, the details of the Tesco Bank incident have yet to be revealed, they can be applauded for opening the lines of communication quickly, but is..
In his latest video blog, Kamber Devjianie from Authlogics talks about the multi-factor alternatives available on the market right now, that can enable you to free your customers, clients, employees and IT department from password-based authentication. He explains single-sign-on, the use of biometric readers on smart devices as a method of convenience rather than security and introduces PINgrid a viable alternative to passwords.