News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Karen Bowen
Karen Bowen
Password Security Expert, Specops Software
Credential Stuffing: the Culprit of Recent Attacks
Blog
23 Sep 2020
Twitter Hack Exposes Security Holes
Blog
11 Aug 2020
Your Employees Are Reusing Passwords – Find Out How Many
Blog
30 Jun 2020
How to Check for Breached Passwords in Active Directory
Blog
29 May 2020
Remote Workforces: Security Challenges Amid #COVID19
Blog
15 Apr 2020
PCI Compliance: Not a Password Security Guarantee
Blog
17 Feb 2020
The Three Cyber Attacks Ruining Your Holiday Spirit
Opinion
19 Dec 2019
Are Pwned Passwords Putting Your Business at Risk?
Blog
16 Oct 2019
Protect Your Organization Against Password Spraying
Blog
19 Jul 2019
How Many Passwords Should be in a Password Blacklist?
Blog
27 May 2019
Understanding ICO Password Recommendations
Blog
6 May 2019
Password Requirements from NCSC & Cyber Essentials
Blog
18 Apr 2019
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Linux Cerber Ransomware Variant Exploits Atlassian Servers
News
17 Apr 2024
1
US Government and OpenSSF Partner on New SBOM Management Tool
News
17 Apr 2024
2
Insider Threats Surge 14% Annually as Cost-of-Living Crisis Bites
News
17 Apr 2024
3
UK Police Lead Disruption of £1m Phishing-as-a-Service Site LabHost
News
18 Apr 2024
4
EU Elections: Pro-Russian Propaganda Exploits Meta's Failure to Moderate Political Ads
News
17 Apr 2024
5
Cybersecurity Pros Urge US Congress to Help NIST Restore NVD Operation
News
16 Apr 2024
6
Banning Ransomware Payments Will Do More Harm Than Good
Opinion
11 Apr 2024
1
Cybersecurity Pros Urge US Congress to Help NIST Restore NVD Operation
News
16 Apr 2024
2
Palo Alto Networks Warns About Critical Zero-Day in PAN-OS
News
12 Apr 2024
3
Russian Sandworm Group Using Novel Backdoor to Target Ukraine and Allies
News
17 Apr 2024
4
Russia and Ukraine Top Inaugural World Cybercrime Index
News
15 Apr 2024
5
FBI Warns of Massive Toll Services Smishing Scam
News
15 Apr 2024
6
Is MFA Enough? Strategies for Next-Level Identity Security in 2024
Webinar
11 Apr 2024
1
Beyond Passwords: Securing the Digital Age with MFA, 2FA, and Passwordless Authentication
Webinar
19 Mar 2024
2
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024
3
Cracking the Culture Code: Building a Cybersecurity-Aware Workforce
Webinar
19 Mar 2024
4
Navigating the Evolving Cybersecurity Compliance Landscape in 2024
Webinar
18 Apr 2024
5
Untangling the Web: Navigating Third-Party Risk in a Hyperconnected World
Webinar
19 Mar 2024
6
Infosecurity Magazine Spring Online Summit 2024: Day One
Online Summit
09:45 GMT, 19 Mar
–
15:00 GMT, 20 Mar 2024
1
Infosecurity Magazine Spring Online Summit 2024: Day Two
Online Summit
10:45
–
16:00 EDT, 20 Mar 2024
2
Russia’s Midnight Blizzard Accesses Microsoft Source Code
News
11 Mar 2024
3
I-Soon GitHub Leak: What Cyber Experts Learned About Chinese Cyber Espionage
News Feature
27 Feb 2024
4
LockBit Takedown: What You Need to Know about Operation Cronos
News
26 Feb 2024
5
Women in Cybersecurity at Infosecurity Europe 2024
Magazine Event
15:00
–
17:30 BST, 5 Jun 2024
6