General | November 15, 2022Password attacks: How to combat them "Treat your password like your toothbrush. Don't let anybody else use it, and get a new...
General | July 9, 2021Five worthy reads: Password hygiene - The first step towards improved security Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
ADSelfService Plus | April 6, 2021The road ahead: McKinsey's top 5 cybersecurity predictions for 2021 and beyond What is a bigger threat to mankind: nuclear weapons or cybercrime? While most would say...
ADSelfService Plus | March 18, 2020All you need to know about NIST password guidelines The National Institute of Standards and Technology (NIST), a physical sciences laboratory...
ADSelfService Plus | March 3, 2020Users and passwords: Their behavior, your responsibility A team of researchers studied a group of users of different age groups, gender, and...
Identity and access management | April 29, 2016Who said password cracking is dead? In a recent conference, I was privy to a insightful session on password cracking. No, not...
Identity and access management | January 8, 2015Active Directory in 2015! Welcome to 2015! I want to thank all of my followers, loyal readers of my articles and...
Identity and access management | January 2, 20152014 Security Year in Review Whew! Thank goodness 2014 is over! Well, at least if you are considering the year's...
Identity and access management | September 11, 2014Trusting Microsoft Baseline Security Analyzer 2.3 Not too long ago, Microsoft updated, or at least updated the version of the Microsoft...
Password Manager Pro | June 4, 2014Passwords, King of Authentication: Long Live the King! This post is a reproduction of an article I wrote that was originally published in...
General | May 13, 2013$45 million ATM heist turns focus again on insider threats, controlling privileged access! New wave of cyber-attacks on banks lend credence to the belief that insider threat is...