article thumbnail

Lucky MVP 13

Troy Hunt

In last year's MVP announcement blog post , I talked about one of my favourite contributions of all that year being the Pwned Passwords ingestion pipeline for the FBI. Reading my posts, watching my videos, turning up to my talks and consuming services like HIBP and Pwned Passwords.

article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Four and a half years ago now, I rolled out version 2 of HIBP's Pwned Passwords that implemented a really cool k-anonymity model courtesy of the brains at Cloudflare. Actually, the multiple problems, the first of which is that it's just way too fast for storing user passwords in an online system.

Passwords 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What will be your decisive moment to secure your cloud applications in a Zero Trust world?

Thales Cloud Protection & Licensing

Recent high-profile breaches, such as the Choice Hotels cloud breach which spanned 40 countries and exposed 700,000 records, is a poignant example of a lesson learned. For example, the study shows that when it comes to cloud solutions, three-quarters (75%) of organizations already rely on access management.

Cloud 115
article thumbnail

Selecting the Right Cloud SSO Solution for Your Organization

Thales Cloud Protection & Licensing

Password-based app access: convenient but risky. The other widely used convention by enterprises is to allow employees to login directly to cloud-based applications such as, (but not limited to) Office365, Slack, Agile, with passwords. For example, Thales offers a combined FIDO-PKI smart card. FIDO Authentication.

Cloud 62