Subscribe to the RSA blogs and podcasts for the latest posts and security updates!
Written on September 13, 2012 by Identity and Data Protection Beat
Hashing, salting and database encryption are ways to protect passwords. But, are they enough? Recent, large scale password breaches have demonstrated that these solutions are susceptible to proven attacks. Maybe something else is needed…
Mail (will not be published) (required)
© Copyright 2011 EMC Corporation. All Rights Reserved.
The opinions expressed here may be personal. Content published here is not read or approved in advance by EMC
and does not necessarily reflect the views and opinions of EMC.