Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Real Reasons Why Users Stink At Passwords
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:02:32 PM
Changing password often
There was another study a few weeks back supporting the idea that changing password often has no impact on security, it might have been even a negative impact.
RyanSepe
RyanSepe,
User Rank: Ninja
9/29/2016 | 1:38:39 PM
Re: Passwords and user behavior
I understand this article seems to be more directed towards the consumer space but biometric controls are becoming more prevalent for consumer devices such as fingerprint.
RyanSepe
RyanSepe,
User Rank: Ninja
9/29/2016 | 1:36:34 PM
Re: Passwords and user behavior
I think an additional parameter is cost. Biometric authentication under MFA can strengthen authentication substantially but is costly to implement. Still needs to be a consideration depending on the value of the data each individual is protecting and the varying levels of acess provided.
T Sweeney
T Sweeney,
User Rank: Moderator
9/29/2016 | 11:47:37 AM
Re: Passwords and user behavior
Thanks for weighing in, Juliette. I've kidded security vendors for years about their inability to create smarter users. Clearly, training and trying to solve this password problem from the human side is not going to work. I agree with you that some sort of predictive analytics should be added. Unfortunately, the human factor in the equation means anything we come up with will be imperfect/penetrable.
JulietteRizkallah
JulietteRizkallah,
User Rank: Ninja
9/29/2016 | 11:02:53 AM
Passwords and user behavior
Interesting commentary.  Any way you look at it, this password issue is not getting resolved any time soon.  Awareness and training will help marginally, but in the end users will always favor convenience over security.  MFA will certainly help but is not 100% secure either.  So what will it take?  Hard to say but it feels that in this particular area, user behavior analytics may help detect a compromised account shortly after the breach. So in this specific issue detection is critical since prevention seems difficult to establish (i cannot believe i am writing these words after preaching for so long that detection was not enough and prevention necessary!).  When it comes to passwords, continuing to think we can chnage human behavior is ludicrous and we need to think outside of the box towards new solutions.
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-43705
PUBLISHED: 2022-11-27
In Botan before 2.19.3, it is possible to forge OCSP responses due to a certificate verification error. This issue was introduced in Botan 1.11.34 (November 2016).
CVE-2022-45934
PUBLISHED: 2022-11-27
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.
CVE-2022-45931
PUBLISHED: 2022-11-27
A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used.
CVE-2022-45932
PUBLISHED: 2022-11-27
A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole function is affected when the API interface /auth/v1/roles/ is used.
CVE-2022-45933
PUBLISHED: 2022-11-27
KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a &quot;fun side proj...