What is an AD password? Learn how to create and manage a secure Active Directory password policy to protect your organization from breaches.| Specops Software
Specops explains what decision makers need to consider before going passwordless.| Specops Software
New research shows how long it takes to crack passwords encrypted with the bcrypt hashing algorithm – plus how bcrypt get cracked.| Specops Software
Learn how RaaS providers DragonForce operate and how to avoid the initial breaches that lead to ransomware deployment.| Specops Software
Uncover the truth about AI vishing: how cybercriminals exploit technology to execute convincing scams - incl. risk evaluation.| Specops Software
Learn the top ten passwords being used against RDP ports from real attack data and how to keep your connections secure.| Specops Software
New Specops research looks into the data around longer passwords. Learn how they boost cybersecurity and where hackers can get around them.| Specops Software
Learn more about SHA256 and how long its takes to crack passwords protected by the SHA256 hashing algorithm.| Specops Software
Read our team’s analysis of the Rockyou2024 password list to learn whether it’s truly a record password breach or mostly garbage data.| Specops Software
Get unique analysis into over one billion malware-stolen credentials and learn how to mitigate password risk.| Specops Software
Specops Breached Password Protection expands with a new source of compromised password data powered by Outpost24's threat intelligence unit.| Specops Software
Find support documentation for the Specops Password Auditor tool installation.| specopssoft.com
Learn how hacker group Scattered Spider used social engineering to trick a service desk agent into offering initial access for a ransomware attack.| Specops Software
Specops uReset support material to manage password reset settings in Active Directory, and reduce password-related calls to the service desk.| specopssoft.com
Specops dedicated product specialist are here to provide help and support for your Specops products and tools.| specopssoft.com
Our research team found over two million malware-stolen VPN passwords. Find out which VPN providers were most affected and the most common breached passwords.| Specops Software
Follow our step-by-step guide (with detailed screenshots) on how to recover deleted objects in Active Directory.| Specops Software
MFA is advised with good reason – but hackers can breach it. We’ll walk through nine MFA breach tactics and show why passwords still matter.| Specops Software
Continuous scans for the Specops Password Policy Breached Password Protection service finding breached passwords daily, instead of only at password change or reset.| Specops Software
Most end users admit to using passwords – how concerned should you be? Understand the dangers of password reuse and how you can mitigate risk.| Specops Software
Getting a password to a new user comes with risk. Learn which passwords are the most commonly compromised plus a more secure method for onboarding.| Specops Software
Secure the initial password for onboarding by sending employees an enrollment link to set their own password. Try First Day Password!| Specops Software
Learn why passphrases give you better Active Directory security and get best practice tips on how to create strong ones.| Specops Software
A recent password spraying hack on software giant Microsoft exploited an unused test account. Here’s everything you need to know.| Specops Software