Remove Authentication Remove Password Management Remove Workshop
article thumbnail

Banks, Arbitrary Password Restrictions and Why They Don't Matter

Troy Hunt

Then there's the authentication process itself and it reminds me of a discussion I had with a bank's CISO during a recent workshop. Exactly, it's basic string-matching and this is really the point: judging banks by the same measures we judge basic authentication schemes is an apples and oranges comparison.

Banking 269
article thumbnail

Reduce your helpdesk burden 20-50%

Thales Cloud Protection & Licensing

Reduce password management pain and the risk of a breach. You may have read NIST 800-63B, so you know “Many attacks associated with the use of passwords are not affected by password complexity and length. Users can rely on existing STA authentication methods to securely authenticate, reset or change their passwords.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Much of this is simply due to lack of awareness; I must have taught 50 security workshops where the vast majority of attendees had simply never heard of CSP before. But getting onto the title of this section, the page in question is the E-Aadhaar authentication page (also geo-blocked).

Hacking 279
article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

Customize training materials to address these specific concerns, including data handling protocols, password management , and phishing attempt identification. Employ Authentication Methods for All Users & Devices A zero trust approach rejects any sort of inherent trust and requires continual verification of all users and devices.

Backups 134
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

This framework guarantees that appropriate authentication measures, encryption techniques, data retention policies, and backup procedures are in place. Questions to Answer Consider these questions to verify your organization’s data security and threat detection strategies: Are multi-factor authentication techniques required for user access?

Risk 108
article thumbnail

The Rise of AI Social Engineering Scams

Identity IQ

This wouldn’t be the first time there’s been confusion as to the authenticity of Musk’s statements. When scammers play on these emotions, they increase the likelihood of victims acting impulsively without carefully considering the authenticity of the situation. Use a password manager to securely store and manage your passwords.