Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 17 May, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Has that password been compromised?

Knowing the answer could save your organisation from disaster

by The Gurus
March 8, 2022
in Featured, Media, News, Podcasts
Has that password been compromised?
Share on FacebookShare on Twitter

Password security has many well-debated weaknesses but one that gets surprisingly little attention is how organisations can know whether and when theirs have been compromised by outsiders. This lack of interest is surprising. Almost all cyberattacks today, including ransomware attacks, exploit stolen or leaked credentials (a password + username), which makes any compromise a critical incident in the making. 

The traditional defence is to change them on a schedule basis on the assumption that a compromise is likely at some point, but this has always been a blunt defence that risks encouraging re-use as users try to cope with constant resets. In 2016, NIST put a pin in this balloon by recommending that organisations no longer mandate automatic password changes unless they have a reason to do so. 

The mistaken assumption is that once a password is lost (with or without the username), there is no way to detect that this has happened. In fact, a way does exist – query databases of leaked passwords culled from dark net sources so see if a known password or password is present.  

Although the idea of monitoring criminal sites for leaked passwords is not new (public databases such as Have I been Pwned? have been around for years), the trick has been finding a way to integrate them into password management systems. Without that integration, password detection would risk becoming a management chore that burdens IT staff with alerts they struggle to react to. 

One company that thinks it has cracked the problem is Authlogics, which has integrated its Password Breach database of 4.1 billion leaked credentials into the company’s Password Security Management system. In this podcast, IT Security Guru editor John E. Dunn and CEO Steven Hope discuss the complex design challenges this posed for Authlogics.  

Integrating a database of leaked passwords into a password management system turned out to be the easy part. The much bigger nut to crack was making it easy for IT teams to fix the credential problems the software detected, weeding out dormant accounts, encouraging users to create secure passwords or phrases.  

Most important of all, time is of the essence. The detection of compromised passwords must allow for real-time detection as soon as compromised credentials appear in the database.   

One day, all password management systems will be built this way.  

Have a listen HERE!

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Seventeen vulnerabilities added to Known Exploited Vulnerabilities Catalog

Next Post

AT&T Cybersecurity Insights Report: Securing the Edge

Recent News

Armis: Top Performer in Asset Visibility and Real-Time Detection in MITRE Engenuity ATT&CK® Evaluations for Industrial Control Systems (ICS)

Armis Launches new ‘Critical Infrastructure Protection Program’

May 17, 2022
jigsaw

Thanos and Jigsaw ransomware linked to 55 year old doctor

May 17, 2022
Google logo

Italian police thwart Eurovision cyberattack

May 17, 2022
nuclear power stack

UK announces nuclear cybersecurity strategy

May 16, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information