Tags » NIST

NIST's new password rules - what you need to know

It’s no secret. We’re really bad at passwords. Nevertheless, they aren’t going away any time soon.

With so many websites and online applications requiring us to create accounts and think up passwords in a hurry, it’s no wonder so many of us struggle to follow the advice of so-called password security experts. 1,085 more words


FTC issues Final Order and data security lessons in LabMD case

On July 29, 2016, the Federal Trade Commission (FTC) made the latest move in its battle with LabMD, Inc. (LabMD) when it reversed an initial decision by an administrative law judge (ALJ).  1,151 more words

Privacy & Security

The various flavors of Two Factors Authentication

Two Factors Authentication is a way to authenticate a user with an application. The name derives from the adoption of two of the three different types of authentication, that is with something you know (like a password), something you have (like a phone) or something you are (like your fingerprint or retina map). 430 more words


Cyber War I

Like one, that on a lonesome road

Doth walk in fear and dread,

And having once turned round walks on,

And turns no more his head; 2,482 more words

NIST Declares Two Factor Authentication Using SMS Texts Insecure

IBM upgrades DeepFlash and UK approves Amazon’s drone delivery testing

eWEEK — National Institute for Standards and Technology (NIST) says SMS-based two-factor authentication isn’t secure; the UK approves Amazon’s plan to run delivery drone tests banned in the U.S.; IBM bolsters its all-flash storage lineup with DeepFlash 150; see video for more… 57 more words


NIST SP 800-183: Network of Things

New #NIST publication: “Network of Things” – https://t.co/RP9l6pT6sG #IoT

— Xavier Mertens (@xme) July 29, 2016

NIST has a new IoT-related document, focusing on the “Network of Things”.

159 more words

NIST Recommends SMS Two-Factor Authentication Deprecation

This is an intriguing draft document by NIST concerning SMS and two-factor authentication.  This is a commonly used technique for many two-factor providers so conversion to more secure methods may take time.  20 more words

Security News