Integrating single sign-on across the cloud

Single sign-on isn’t new: it has been around for more than a decade to help enterprises manage multiple passwords. And given the number of leaked passwords as of late it is becoming increasingly important as a security tool. What is new however is that an SSO tool can secure both local server and cloud-based ones.

You can read more of my thoughts for a custom white paper I wrote for McAfee here.And here is a link if you would like to read my review of 8 different SSO tools that I did for Network World earlier this year, including McAfee’s and Okta’s products.

Top ten security stories of the week

The top security stories of the past week, as part of my work to help curate the Dice Security Talent Community portal.

Top security stories for the week – Turkey edition

Yes, there are some real security turkeys out there this week, and here are links to my favorite ones for my work curating the Security Talent Community at Dice.

The widening Adobe breach

Like many of you, I heard last month about the Adobe breach and didn’t give it much mindshare. Turns out things keep getting worse, and I was foolish to ignore what happened. Mea culpa. Here is a catch-up column along with lotsa links that go into further details, and why you should be worried.

adobeWhen I first heard about it, I thought: I don’t have anything to worry about. I am not a user of their products. And then I thought, so big deal: a few emails and passwords released to the bad guys. Wrong, wrong and wrong.

First of all, it now turns out there are 130 million email-password combinations that can be used for all sorts of mischief. And my name is most certainly in that list, mainly because somewhere along the line I did register for something that Adobe now owns. So is yours in all probability. The file includes both active members and inactive names. Who knew that Adobe kept the inactive accounts around?

Second, security researchers have been data mining the list and have come up with ways to figure out what the passwords are, so you can bet the bad guys are actively downloading the list and doing the same. Because of the large amount of data, it is fairly easy, based on the password hints which are also part of the file, to crack the very weak methods (I hesitate to call this encryption, because it almost like using a simple substitution code) that Adobe used. One author has published the more popular passwords that show up in the file: ‘123456’ seems to be one password that will never go out of style, having shown up almost 2 million times!

Third, other site operators such as Facebook (how ironic!), Eventbrite and even Diapers.com (yes, that is a real site) have already jumped in and sent emails to their users warning them to change their account passwords. This is  because there is a good chance that you used the same password to login to their services. I got one of those emails but somehow deleted it unread last week.Boo-hoo for me.

At least Adobe is asking you to change your account password when you do finally check in. Thanks Adobe, that was a nice touch and the least that you could do..

Finally, there is some chatter that credit card information also might be stored as poorly as the passwords. I don’t think that I ever gave Adobe this data but given the state of my memory, I can’t be sure.

So take the time to change your accounts with passwords that you might have shared with Adobe, either by intent or by accident, before someone starts using one of them for nefarious purposes. While you are changing things, use a password manager and stronger passwords too. And you might want to audit your Facebook, Twitter and LinkedIn accounts as I mention here to ensure that the apps that can access these accounts are still what you wish.

The links to the numerous stories and specifics can be found below:

Top security stories of the week

My top security stories of the week as part of my work to curate the Dice Security Talent Community.

SearchSecurity.com: Enterprise password management tools have room to improve

lastpass enterprise consoleWhile we all have too many passwords to deal with, few of us have the proper tools for promoting better password hygiene in our day-to-day working lives. Despite the variety of consumer-oriented products available, finding an enterprise password management product or tool can be quite difficult.

In this piece for SearchSecurity, we’ll briefly examine the landscape of password management offerings and highlight the benefits and drawbacks of today’s tools in an enterprise context.

Dice: Security favorites of the week

My favorite security stories of the past week, as part of my efforts to curate the Dice Security Talent Community portal.

Dice: Best security news stories of the week

Here are my favorite security news stories of the week, as part of my work to curate the Dice Security Talent Community.

Dice: Top 10 security stories of the week

My favorite security stories of the week, as part of my curated portal on the Dice Security Talent Commmunity.

InfoSec Mag: Next-gen firewalls play by new rules

Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced, many IT security experts are still stuck with the original firewalls that handle ports and protocols.

You can read the full article (with registration) here in the September issue of Information Security magazine.

There is also an accompanying video/slidedeck with copious screenshots of the various products and a more specific article about how to manage application access policies. All three can be found here.