When it comes to the Active Directory password hash, beware of the LM Hash and passwords that are less than 15 characters.| Specops Software
Learn the most common types of password attacks, how credential-based attacks work, and where you should be bolstering your defenses.| Specops Software
New research shows how long it takes to crack passwords encrypted with the bcrypt hashing algorithm – plus how bcrypt get cracked.| Specops Software
Learn all about Hybrid Password Attacks: Attack methods and matching defense mechanisms to make hybrid threats less likely to succeed.| Specops Software
Compromising login credentials is the goal of many modern cyber-attacks. If successful, they can result in the worst types of data breaches, especially...| Specops Software
Today, the Specops research team is publishing new data on how long it takes modern attackers to brute force guess user passwords with the help of newer...| Specops Software
Use Active Directory GPOs to create granular password policies. Specops Password Policy strengthens passwords, and enforces password policy standards.| Specops Software
Learn why passphrases give you better Active Directory security and get best practice tips on how to create strong ones.| Specops Software
Reduce cyber risks with insights from the 2024 Data Breach Investigations Report (DBIR) from Verizon. Read the official report today.| Verizon Business