You only have to look at the headlines to see that security breaches are becoming more frequent. Just recently, the New York Times reported that hackers had amassed over a billion Internet passwords. One reason that security breaches keep happening is that many websites continue to use simple passwords for authentication. But, what if when hackers got into a database of user credentials, they discovered that there were no passwords to breach?
CA Advanced Authentication can help solve the problem of compromised passwords. Implementing our strong authentication solution helps organizations to improve security without inconveniencing end users.
It seems like every day we see in the news that another breach has occurred. In fact, the New York Times recently reported on a security breach that involved over a billion online account passwords. Why does this keep happening? One reason is that many websites continue to use simple passwords for authentication and choose to store them as hashes. Another reason is that identity theft and fraud is a big business.
With passwords like "MiloPug," it’s breach after breach. So why aren’t hashing and salting enough to prevent attacks?
Read the blog post: Making a Hash of Password Security >
How do you make your customers’ passwords “unbreachable” so when the bad guys get in, there’s nothing to steal?
Read the blog post: The Joke’s on Password Breaches >
Be Smarter than a Hacker. Intelligent Authentication Must be Strong & Risk-Based
In the past—and even now—IT departments have employed authentication methods that required end users only to provide a valid user ID and a password. Hackers have been successfully targeting user names and passwords as an entry point for malicious attacks for some time. To stay ahead of hackers, you need best practice Intelligent Authentication methods that include both strong and risk-based authentication.
Please join Carole Gunst, Sr. Principal and Charley Chell, Sr. Director, Security Solutions from CA Technologies to learn which Intelligent Authentication methods are essential and what you can do to protect your organization with authentication methods that are both strong and risk-based.