DR Radio: A Grown-Up Conversation About PasswordsDR Radio: A Grown-Up Conversation About Passwords
Cormac Herley of Microsoft Research will challenge everything you think you know about password management.
September 16, 2014

We all know the rules. At least eight characters; combination of lowercase, uppercase, numerals, and special characters; different for every account; changed periodically; and never stored in plain text anywhere, not even on a Post-it note. Those are the golden rules for password management we all know, advise, and (probably) follow... but maybe we're wrong.
Over the past few months, the public has been hammered with data breaches, including those that exposed passwords. Security experts have been thrust into the public eye, in newspapers and on television, urging, begging, and warning users to improve their password practices. Yet Cormac Herley, principal researcher at Microsoft Research, says that it's time to stop putting all the responsibility on end users -- time to stop the blaming and shaming. Not only is following the rules too difficult, says Herley, but it isn't even worth the effort.
Herley's recent work on passwords, with Dinei Florencio and Paul C. van Oorschot, includes statements like "a [password] portfolio strategy ruling out weak passwords or password re-use is sub-optimal," and if the IT department doesn't do its job well, "there is no attack scenario where the [user's] extra effort protects the account."
Sound crazy? Want to know how they came to those conclusions? Then don't miss the next episode of Dark Reading Radio, "A Grown-Up Conversation About Passwords," tomorrow, Wednesday, Sept. 17 at 1:00 p.m. ET/10:00 am PT, with our guest, Cormac Herley.
Have questions you want us to ask? Let us know in the comments below. If we can't get to those questions during the audio interview, never fear -- you'll have the chance to ask him questions yourself, during the live chat session happening alongside the broadcast.
Don't miss this chance to challenge all your assumptions about password management. Register now.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023