Learn about password expiration best practices, the reality of password attacks and the alternatives available to IT teams.| Specops Software
New research shows how long it takes to crack passwords encrypted with the bcrypt hashing algorithm – plus how bcrypt get cracked.| Specops Software
Learn the top ten passwords being used against RDP ports from real attack data and how to keep your connections secure.| Specops Software
Learn more about SHA256 and how long its takes to crack passwords protected by the SHA256 hashing algorithm.| Specops Software
Get unique analysis into over one billion malware-stolen credentials and learn how to mitigate password risk.| Specops Software
Specops Breached Password Protection expands with a new source of compromised password data powered by Outpost24's threat intelligence unit.| Specops Software
Our research team found over two million malware-stolen VPN passwords. Find out which VPN providers were most affected and the most common breached passwords.| Specops Software
MFA is advised with good reason – but hackers can breach it. We’ll walk through nine MFA breach tactics and show why passwords still matter.| Specops Software
Most end users admit to using passwords – how concerned should you be? Understand the dangers of password reuse and how you can mitigate risk.| Specops Software
Learn why passphrases give you better Active Directory security and get best practice tips on how to create strong ones.| Specops Software
Passwords are an area where password security and user experience clash. Here’s how to make both work. A safe and user-friendly way.| Specops Software
A recent password spraying hack on software giant Microsoft exploited an unused test account. Here’s everything you need to know.| Specops Software