With technology constantly evolving, cybersecurity organizations are helping people, businesses, and governments with best practices to protect themselves against emerging threats. The Center for Internet Security (CIS) is one of these advisement groups. The CIS Controls and CIS Benchmarks provide globally recognized best practices for security IT systems and... Read More
News and Research
“Who you gonna call?” About these compromised passwords [new data]
If your colleagues are Ghostbuster fans, they might be at risk for compromised password use. Ahead of the upcoming Ghostbusters: Afterlife movie release, Specops Software investigated which Ghostbuster-themed passwords were most popular in compromised password lists. This analysis coincides... Read More
Protecting Your Organization Against the Nobelium Attacks
The UK’s National Cyber Security Centre has recently issued guidance to organizations in response to a series of attacks. This guidance was released following a notification in which Microsoft indicated that it had identified new activity tied to an... Read More
Outpost24 acquires Specops for enhanced user security and secures further funding to continue growth
STOCKHOLM, November 4, 2021 – Outpost24, an innovator in identifying and managing cybersecurity exposure, today announced the acquisition of Specops Software, a leading provider of password management and user authentication solution, as well as securing another SEK 50 million... Read More
What metrics should sysadmins use to show improvement over time?
To illustrate how essential IT systems are to the proper functioning of the business, system administrators should use a number of metrics to communicate key KPIs with non-technical leadership. This can help justify the overall budget of the IT department, as well as the... Read More
Death of the password? It’s only 60!
We marked our calendars, counting down the months, days, and minutes. Now, the day we’ve all been waiting for is here: the 60th anniversary of the computer password! Since its beginning in an MIT lab in the fall of... Read More
NYDFS cybersecurity regulation requirements
Financial organizations house a myriad of sensitive customer data, including login credentials, personally identifiable information (PII), and account numbers. With valuable data at stake, the financial services industry repeatedly has the highest cost of cybercrime. As the threat of breaches looms across the industry, and remote work introduces more variables into the cybersecurity equation, it’s clear that... Read More
FFIEC password requirements
Cyberattacks often target the financial industry due to the nature of the information they possess. One of the organizations that provide cybersecurity guidance and standards for financial institutions is the Federal Financial Institutions Examination Council (FFIEC). While the FFIEC does not offer specific password characteristics... Read More
Block These Recently Leaked VPN Passwords to Prevent Ransomware Attacks [new data]
Worried about ransomware attacks? Recent attack news indicates you should be looking to secure your VPN connections. Last week, we learned that thousands of Fortinet VPN passwords had been leaked on the dark web by a former ransomware operator.... Read More
Division 1 College Football Teams and Mascots Keep Showing Up on Breached Password Lists
The Rambling Wreck of Georgia Tech may not have earned a single vote in the AP’s preseason college football Top 25 rankings, but when it comes to appearing on breached password lists, the prestigious university ranks #1. In conjunction with the... Read More