RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Account Takeover, Active Directory, NIST 800-63, Regulation and Compliance
Enable a quick-to-deploy, automated password policy and daily exposed password screening. Follow NIST password guidelines in Active Directory. Here is how!
Active Directory, Continuous Password Protection, Cybersecurity, NIST 800-63
Why NIST Password Requirements Should Drive Your Password Strategy in 2020. Reduce user friction and improve password policy.
Active Directory, Continuous Password Protection, NIST 800-63, Regulation and Compliance
The new draft of the NIST Privacy Framework is ready for public privacy and security expert commentary. Send your feedback by the October 24 deadline.
Cybersecurity, Data Breaches, NIST 800-63, Password Security, Regulation and Compliance
Law firms are frequently targeted by hackers but the ABA's Formal Opinion 483 will guide law firm cybersecurity policy to protect firms and their clients.
Active Directory, NIST 800-63, Regulation and Compliance
The big changes to NIST password recommendations we’ve been talking about are now official: NIST 800-63 is final. It’s important to know that this overhaul is about more than just passwords. It’s a full reworking of digital identity guidelines with a suite of new documents and a flexible approach to using them.
NIST 800-63, Password Tips, Regulation and Compliance
NIST suggests passwords should be screened against commonly-used, expected, or compromised passwords. This is intended to ensure passwords are not found in common cracking dictionaries that would make them easy to guess. These checks can occur at account creation and password reset. But then what? How do you know if they are still safe after time?
Cybersecurity, NIST 800-63, Regulation and Compliance
The US National Institute of Standards and Technology (NIST) just finalized new draft guidelines, completely reversing previous password security recommendations and upending many of the standards and best practices security professionals use when forming policies for their companies.
No Spam. Only sweet content and updates on our products and solutions.