The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.
Mobile? Grab this Article!
Tip of the Week Security Technology Privacy Best Practices Cloud Google Tech Term Business Computing User Tips Data Backup Email Network Security Hackers Hosted Solutions Innovation Data Hardware Microsoft Browser Malware Data Recovery Cloud Computing Internet Smartphones Software VoIp Chrome Managed IT Services Android Communications Alert Business IT Services Small Business Workplace Tips Mobile Devices Communication Cybercrime Productivity Smartphone Business Management How To Backup Internet of Things Outsourced IT Windows 10 Network Cybersecurity Artificial Intelligence Windows Efficiency Phishing Vulnerability Collaboration Computer Office 365 Word IT Support Saving Money Money Ransomware Information Spam Business Continuity BDR Computers Applications Data Protection Passwords Connectivity Router Data Breach Miscellaneous Server Voice over Internet Protocol Mobile Device Management Gadgets Save Money Telephone Systems Social Engineering Facebook Two-factor Authentication Data Security Managed IT Services App Social Media Windows 7 Update Managed Service Law Enforcement Wi-Fi Telephone System Operating System IT Management Mobile Device Paperless Office Remote Monitoring Redundancy BYOD Fraud Servers Google Drive Microsoft Office Keyboard Automation WiFi IT Plan Infrastructure Comparison Upgrade Spam Blocking Apps HaaS Sports CES Avoiding Downtime Encryption Virtualization Google Docs Bandwidth Unsupported Software Password Human Resources Data Storage Content Management Holiday VPN Website Employer-Employee Relationship Software as a Service Business Intelligence Identity Theft Telephony OneNote Blockchain Virtual Assistant Scam Bring Your Own Device Managed IT Settings Big Data IT Consultant Microchip Credit Cards Google Apps Millennials HIPAA Outlook Evernote USB Marketing Wiring Computer Fan Criminal Botnet Password Management Digital Signature Patch Management Computer Care Supercomputer MSP Business Mangement Devices Office Samsung Search Engine Netflix Windows 10s Workers Access Control Skype Trending Public Computer Entertainment Knowledge Warranty Emails Workforce Electronic Medical Records Frequently Asked Questions Screen Mirroring Cleaning Sync Windows 10 Wire Firewall webinar The Internet of Things Travel NIST Amazon PDF File Sharing Solid State Drive Gmail Thought Leadership Tools Office Tips HVAC Bing Flexibility Meetings Authentication Machine Learning Network Congestion Printer Downtime Telecommuting Data Management Excel Cast Charger Practices Unified Threat Management FENG Physical Security Safety Cryptocurrency Amazon Web Services SaaS Hiring/Firing Augmented Reality Leadership Audit Recycling Software Tips Help Desk Government Private Cloud Nanotechnology Specifications YouTube Mouse Root Cause Analysis Remote Work Tip of the week Wireless Charging Hosted Computing Assessment Smart Office Current Events Mobile Computing Conferencing Disaster Recovery Automobile Safe Mode Flash Cache Budget Training eWaste Addiction Value Networking Windows Server 2008 Recovery IBM Public Cloud Password Manager Smart Tech Start Menu Administrator Staff Cortana Inventory Multi-Factor Security Television Document Management Camera Work/Life Balance HBO Online Shopping Accountants Quick Tips Wireless Internet Remote Worker Legal Enterprise Content Management Shortcuts Data loss Managing Stress Printers Congratulations Emergency CrashOverride Compliance Webinar Twitter Regulation IT support Company Culture IT solutions Thank You