Authentication

Archive

Can’t trust those strength meters to give you a strong password

So a study by Concordia has shown that the password strength meters we sometimes rely on to measure how good our passwords are, aren’t really that good themselves. The same password gave varied results about...

Why do we need a universal authenticator?

So I ran across this article and it was just "wow" about how some people manage their passwords. Now I've seen the stickies under the keyboard (or worse, on the monitor), and I even remember...

Are We Getting Closer to Universal Authenticators?

So I’ve talked a lot about how you can use 2FA within your organization, and how it could have solved some big issues in terms of hacks and other breaches in the last few months,...

Location becomes a factor in 2FA

As I’ve said before, there are many things that could be used as a factor for authentication, and I think this may be the first commercial use on a large scale. This is potentially a...

Sometimes 2FA is hidden, but it’s still there

Now this isn’t something new, but I thought that the description of what some banks do to secure your login is a good one. We aren’t all banks, and we don’t all have the resources...

Healthcare Breach of 70M Records

Late on Wednesday, it was confirmed that Anthem, the second largest health insurer in the U.S., was breached (ransacked is the word used to describe the attack and severity of the access). While it isn’t...

As if you needed another reason to move to 2FA

The annual list of the worst passwords just came out. As usual, it should be more than enough to make those of us trying to provide security groan, moan, and slap our collective heads. The...

A Skeleton Key to Your Network

There is a new report on a serious piece of malware called Skeleton Key that allows Active Directory logins using a single factor (i.e. password) to be bypassed. This malware, when active on a domain...

Don’t forget to make sure 2FA can’t be bypassed

I ran across this article about the latest iCloud problem. The security hole is interesting in that it could be exploited to bypass any and all higher-level or secondary authentication checks. So the hack came...

Authentication as a Good Bottleneck

Normally, we think of bottlenecks as a bad thing. They limit how fast we can go, how much bandwidth we have, and keep us from reaching our full capability. We definitely do as much as...