Premium Content

Access "Breaking the code: Are passwords destined for obscurity?"

Issue Overview

IT in Europe - December 2011

User passwords for websites, email and social networks are often the weakest link in the security chain. The winter edition of IT in Europe: Information Security e-zine investigated the state of passwords in the UK and presented alternatives to the ubiquitous authenticator.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Gartner: The rise of the chief data officer and what it means for IT leaders
    Gartner-RiseoftheCDO.jpg
    E-Handbook

    CIOs should view the Chief Data Officer as a peer and a partner who will enable them to focus on the job they already have, says Gartner analyst ...

  • Content Collaboration and Processing in a Cloud and Mobile World
    Content-Collaboration.jpg
    E-Handbook

    This research from AIIM assesses the drivers for collaboration technology, the strategy choices being made, and the feature organisations are ...

  • The Digital Value Proposition and securing CEO buy-in
    Digital-value-proposition.jpg
    E-Handbook

    Every business should be a digital business, says Stephen Paterson, Chief Product Officer at ANDigital in this presentation.