Authentication: Cybersecurity’s First Line of Defense
Without securing authentication, you allow hackers to steal your intellectual property, steal your money and steal your customers’ personal information.
Without securing authentication, you allow hackers to steal your intellectual property, steal your money and steal your customers’ personal information.
Security or convenience is no longer an acceptable trade-off when it comes to cybersecurity. They must be mutually inclusive, otherwise employees will circumvent security for their own personal convenience. NIST and Microsoft understands this to a degree, but in the latest NIST Password Guidelines SP 800-63-3 the recommendations favors password convenience over password security.
Passwords and biometrics both have their place in cybersecurity and authentication, but not as competing Single Factor Authentications. Instead, their strength comes when they are combined together for Multi-Factor Authentication.
Don’t kill passwords because the industry is confused between password authentication and password management.
Addressing concerns that federal agencies are not taking advantage of innovative cybersecurity offerings, particularly from small businesses and startups.
I need your help in getting the Department of Commerce, Department of Labor and the GSA to authorize the creation of new NAICS, SIC, and GSA SIN procurement codes for cybersecurity products and services.
Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwordsRead… Read more »
When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real worldRead… Read more »
By Dovell Bonnett, Founder and CEO, Access Smart, LLC In a world of ever-increasing cyber-attacks, IT invests massive amounts of time, energy and money to secure corporate networks and data. Because there are no silver bullets, many different security technologies attempt to address each potential threat. With so many different vulnerability points, the first lineRead… Read more »
To a computer, a key is a series of zeroes and ones used to authenticate knowledge of a secret to complete a requested task. To a computer, a password is a series of zeroes and ones used to authenticate knowledge of a secret to complete a requested task. Wait a minute; both a password and… Read more »