DR Radio: A Grown-Up Conversation About Passwords
Cormac Herley of Microsoft Research will challenge everything you think you know about password management.
We all know the rules. At least eight characters; combination of lowercase, uppercase, numerals, and special characters; different for every account; changed periodically; and never stored in plain text anywhere, not even on a Post-it note. Those are the golden rules for password management we all know, advise, and (probably) follow... but maybe we're wrong.
Over the past few months, the public has been hammered with data breaches, including those that exposed passwords. Security experts have been thrust into the public eye, in newspapers and on television, urging, begging, and warning users to improve their password practices. Yet Cormac Herley, principal researcher at Microsoft Research, says that it's time to stop putting all the responsibility on end users -- time to stop the blaming and shaming. Not only is following the rules too difficult, says Herley, but it isn't even worth the effort.
Herley's recent work on passwords, with Dinei Florencio and Paul C. van Oorschot, includes statements like "a [password] portfolio strategy ruling out weak passwords or password re-use is sub-optimal," and if the IT department doesn't do its job well, "there is no attack scenario where the [user's] extra effort protects the account."
Sound crazy? Want to know how they came to those conclusions? Then don't miss the next episode of Dark Reading Radio, "A Grown-Up Conversation About Passwords," tomorrow, Wednesday, Sept. 17 at 1:00 p.m. ET/10:00 am PT, with our guest, Cormac Herley.
Have questions you want us to ask? Let us know in the comments below. If we can't get to those questions during the audio interview, never fear -- you'll have the chance to ask him questions yourself, during the live chat session happening alongside the broadcast.
Don't miss this chance to challenge all your assumptions about password management. Register now.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024