Please turn on your JavaScript for this page to function normally.
SaaS
Great security or great UX? Both, please

A new user is signing up for a SaaS application. On the one hand, UX teams want that user to get into the app as quickly as possible. On the other hand, security teams want …

passwords
Longer passwords aren’t safe from intensive cracking efforts

88% of organizations still use passwords as their primary method of authentication, according to Specops Software. The report found that 31.1 million breached passwords had …

Microsoft Outlook
Attackers can steal NTLM password hashes via calendar invites

A recently patched vulnerability in Microsoft Outlook (CVE-2023-35636) that can be used by attackers to steal users’ NTLM v2 hashes can be exploited by adding two …

authentication
Breaking down the state of authentication

In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey …

passwords
Many popular websites still cling to password creation policies from 1985

A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found. …

passwords
Love for sports could lead to poor password practices

33% of Americans have used a sports-related term in a password, according to Bitwarden. Those who have are twice as likely to have used one inspired by a professional sports …

Anna Pobletts
How passkeys are reshaping user security and convenience

In this Help Net Security interview, Anna Pobletts, Head of Passwordless at 1Password, talks about passkey adoption and its acceleration in 2024. This trend is particularly …

passwords
How global password practices are changing

Password health and hygiene improved globally over the past year, reducing the risk of account takeover for consumers and businesses, according to Dashlane. Password reuse …

businessman computer
Cybersecurity habits and behaviors executives need to be aware of

Top executives — the employee group most targeted by threat actors — are frequently provided unfettered access to valuable data sources and networked assets, according to …

Person
Legacy authentication leads to growing consumer frustration

Despite widespread usage of passwords lingering on, consumers want to use stronger, more user-friendly alternatives, according to FIDO Alliance. Entering a password manually …

passwordless
Anticipating the benefits of a passwordless tomorrow

Businesses are actively moving to eradicate passwords from employees’ lives, with 89% of IT leaders expecting passwords to represent less than a quarter of their …

computer
Incentivizing secure online behavior across generations

As the landscape of online security continues to evolve, there is a noticeable shift in people’s perceptions of cybersecurity, with an increasing awareness of its vital …

Don't miss

Cybersecurity news