Alternative Search Engine

Security Think Tank: Passwords alone are not good enough

https://www.computerweekly.com/opinion/Security-Think-Tank-Passwords-alone-are-not-good-enough
See More From: computerweekly.com   ( Internet & Websites )

Jul 9, 2018 2:11 AM 9+ mon ago

Security Think Tank: Passwords alone are not good enough

In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevitably lead to people following them blindly, what actually makes a good password and when is a password alone not enough?...

Read More

Security Think Tank: How to create good passwords and add security layers

computerweekly.com     9+ mon ago

Security Think Tank: How to create good passwords and add security layers In light of the fact complex passwords are not as strong as most people think and most password strategies inevitably lead to ...

Security Think Tank: Complex passwords provide a false sense of security

computerweekly.com     9+ mon ago

Security Think Tank: Complex passwords provide a false sense of security In the light of the fact that complex passwords are not as strong as most people think, and that most password strategies inevi...

Security Think Tank: Put more layers around passwords to up security

computerweekly.com     9+ mon ago

Security Think Tank: Put more layers around passwords to up security In light of the fact that complex passwords are not as strong as most people think and most password strategies inevitably lead to ...

Security Think Tank: Not all security service providers are created equal

computerweekly.com     8+ mon ago

Security Think Tank: Not all security service providers are created equal What critical security controls can be outsourced, and how do organisations, SMEs in particular, maintain confidence that they...

Security Think Tank: Outsource security operations, not control

computerweekly.com     8+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Defend application layer with good security hygiene

computerweekly.com     5+ mon ago

As soon as you allow an application through your firewall, there is a possibility of a layer attack on it. Of course, we have to let applications through firewalls to do business - to allow remote use...

Security Think Tank: Outsource responsibility, not accountability

computerweekly.com     8+ mon ago

Security Think Tank: Outsource responsibility, not accountability What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that they are bein...

Security Think Tank: Firms need to support good password practices

computerweekly.com     9+ mon ago

...

Security Think Tank: Cracking the code what makes a good password?

computerweekly.com     9+ mon ago

Security Think Tank: Cracking the code what makes a good password? In light of the fact complex passwords are not as strong as most people think, and that most password strategies inevitably lead ...

Security Think Tank: Situational awareness underpins effective security

computerweekly.com     4+ mon ago

Security Think Tank: Situational awareness underpins effective security As attackers begin to use multiple command and control systems to communicate with backdoors and oth...

Security Think Tank: Almost all security can be outsourced, but not the risk

computerweekly.com     8+ mon ago

Security Think Tank: Almost all security can be outsourced, but not the risk What critical security controls can be outsourced and how do organisations, SMEs in particular, maintain confidence that th...

Security Think Tank: Follow good practice to reduce risk of software vulnerabilities

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Cyber attack survival not a matter of luck

computerweekly.com     1+ week ago

Cyber risk should always be considered as a business risk and not just a technical issue. A cyber attack can cause severe damage to businesses large and small and can lead to business failure. SMEs c...

Security Think Tank: Focus on security before app deployment

computerweekly.com     5+ mon ago

In the rush to deploy applications, security becomes an afterthought and is largely ignored when it really matters most - during the software development process. From a purely financial point of vie...

Security Think Tank: Put collaboration on 2019 security agenda

computerweekly.com     4+ mon, 10+ min ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. In the 12 years that Threat Horizon has been published, many of the predicted threa...

Security Think Tank: Align security strategy to business objectives

computerweekly.com     4+ mon ago

Security Think Tank: Align security strategy to business objectives At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 ...

Security Think Tank: Approach UTM with caution

computerweekly.com     2+ mon ago

Security Think Tank: Approach UTM with caution How can organisations best use unified threat management tools to help stem the tide of data breaches? Share thi...

Security Think Tank: Some basic password guidelines

computerweekly.com     9+ mon ago

Security Think Tank: Some basic password guidelines In light of the fact that complex passwords are not as strong as most people think and that most password strategies inevitably lead to people follo...

Security Think Tank: Walk before you run

computerweekly.com     3+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. Having said that, the paradigm of zero-trust networks, software-defined datacentres...

Security Think Tank: A risk-based approach to security outsourcing

computerweekly.com     8+ mon ago

...

Security Think Tank: A three-pronged approach to application security

computerweekly.com     5+ mon ago

In October 2018, an article in Computer Weekly noted that "Most organisations (67%) believe hackers can still penetrate their network and 89% say they have had an application layer attack in the past ...

Security Think Tank: Top things to consider in security outsourcing

computerweekly.com     8+ mon ago

Security Think Tank: Top things to consider in security outsourcing What critical security controls can be outsourced, and how do organisations SMEs in particular maintain confidence that they...

Security Think Tank: Enable outcomes-based security in software development

computerweekly.com     6+ mon ago

Front-line operational security will always require a tick box element to ensure everyone is synchronised and singing from the same cyber security hymn sheet. Those on the front line cannot afford to ...

Security Think Tank: Firms neglect DNS security at their peril

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. Enter command and control (C&C) communications, the mechanism by which malware can ...

Reaction to Pope?s Abuse Letter: Words Alone Are Not Enough

thetablet.org     7+ mon ago

The Tablet August 22, 2018 Pope Francis prays as he leads a Lenten penance service in early March in St. Peter s Basilica at the Vatican. No effort must b...

Security Think Tank: How to manage software vulnerabilities

computerweekly.com     7+ mon ago

Follow: Software vulnerabilities continue to be discovered on a daily basis, and it can often be a race against the hacker to apply relevant updates and remediate a vulnerability bef...

OPINION: Proposed Endangered Species Reforms Are Good, But Not Good Enough

dailycaller.com     6+ mon ago

The 1973 Endangered Species Act (ESA) has been a costly fiasco. It has failed to protect or help revive species at risk of extinction. However, the ESA has allowed the government to go ...

Sport24.co.za

sport24.co.za     9+ mon ago

Pel - offered us some wisdom and predicted that an African country would win the Soccer World Cup before the turn of the century. While some took his prediction seriously because of his stature - P...

Security Think Tank: How to achieve software hygiene

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Strategies for blocking malware comms

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. From a cyber adversary standpoint, an attacker will often maintain access and persi...

Security Think Tank: Surviving the existential cyber punch

computerweekly.com     4+ day ago

Every good chief information security officer (CISO) knows that a potentially existential cyber attack, whether from an external or internal source, looms ahead. There is no "if" for the CISO. Rather...

It s not good enough

news.com.au     10+ mon ago

A NOTE ABOUT RELEVANT ADVERTISING: We collect information about the content (including ads) you use across this site and use it to make both advertising and content more relevant to you on our network...

Security Think Tank: Prioritise multifactor authentication in 2019

computerweekly.com     4+ mon ago

One thing predicted for 2018 that did not happen We predicted that attackers might target cyber insurance firms to learn who had pay-out policy coverage in order to...

Security Think Tank: C-suite needs to drive outcomes-based security

computerweekly.com     6+ mon ago

Everywhere you look, there are articles saying that security is a c-suite issue. Sadly, it seems the only people who do not realise that are members of the c-suite. The upper echelon of businesses nee...

Security Think Tank: Creative thinking key to meeting emerging security challenges

computerweekly.com     3+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. Other developments, such as cloud computing, have hastened the displacement of netw...

Search Builder

(Click to add to search box)
supplement authentication methods  authentication Emma Bickerstaffe  access control mechanisms  authentication factor  biometric security  password security  risk mitigation  Computer Weekly  risk score  dictionary attacks  authentication method  customer experience  authentication factors  authenticator app  security standards  Roman legions  cyber attacks  contextual factors  brute force  United States  password fatigue  state security  IoT security  Roman times  Passwords date  CTSS passwords  password strategies  security outsourcing Security  software development Security  Align security strategy  app deployment Security  Cyber attack survival  software vulnerabilities Security  application security Security  password practices Security  business objectives Security  security hygiene Security  Defend application layer  Outsource security operations  security service providers  security Security  software hygiene Security  security layers Security  malware comms Security  software vulnerabilities OPINION  caution Security  Approach UTM  cyber punch  Complex passwords  control Security  Outsource responsibility  Enough Security  peril Reaction  accountability Security  Firms need  Risk tolerance  Situational awareness  Security governance  Top things  risk Security  luck Security  
**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.