Storage

Storage
Pulse Flash Read: Password(less) Passwords are rubbish, aren’t they?  We’ve all asked for someone else’s Netflix login, only to break out in a cold sweat when you see that their password is something like: basketball (yeah, they finally signed up to watch The Last Dance). And, let’s be honest, you didn’t feel great about them sending it over iMessage either. I’ve literally turned down free access to Netflix because of this. And cybersecurity experts like NordPass agree: they’re sick of telling us how rubbish passwords are.  Letting humans stay in control of those crucial windows of access that passwords reveal will always be problematic. The bad actors awaiting in that password-generated web traffic are experts at exploiting human faults. Take the recent Twitter hack: Two-Factor Authentication (2FA) seemed like a great extra layer of security until a fatal flaw in the thinking was revealed: all it took was some social engineering and the implicit trust users feel with 2FA was turned into a classic bit of phish bait. What if the answer is in the problem? Password-related attacks happen when human meets internet. Can we remove either or both of those issues? Turns out we can. Hardware Security Modules (HSMs) are secure pieces of hardware for containing digital information, lock and key in a discreet piece of machinery that fits neatly on your desk. (Actually, they’re pretty small nowadays, the main issue might be losing it, SD-card style.) They generate truly random keys, unlike computers, that exist outside of the internet’s nefarious reach, providing what’s known as Root of Trust (RoT); trusted nodes within a cryptographic system, a critically important element for any IoT network (and much more reliable than human secret-keepers). If you’d prefer not to ship out HSMs to all your remote staff, there are simpler options that, while not as cloaked as HSMs, at least bypass the password problem. Both AWS and Microsoft Azure offer OTP (One Time Password) access via SMS (yes, it might seem annoying at first but it takes less time than resetting that password we forgot 30 seconds after creating it), plus others such as Okta, OneLogin, Acceptto and Hitachi ID offer robust solutions. We produced a white paper with Microsoft you can read here about IT execs’ experiences with FirstLine Employee remote login.  Magic links are another option. San Fran-based Magic (formerly Fortmatic) promises ‘customizable, future-proof, passwordless login with a few lines of code’. All you have to do is embed Magic on your site and apps, clients receive an email link they click to sign in, and that’s that. The link, like that 5 of hearts you were watching, vanishes and the hijacking opportunity along with it. (Incidentally, Magic uses HSMs to handle your data.) Here’s a guide of how to add Magic to your apps, including a more in-depth discussion of both HSMs and Magic. The demise of the password comes with an acceptance of our own limitations. We forget. We enjoy simplicity. We share. So, accept that your team are human and find a password alternative that fits your needs. Because if you don’t, those clients, and your investors, might end up being another thing you’re scrambling to retrieve. What startups/tech are you excited about in the passwordless space?

Top Answer : This is our first editorial piece by our community editor Aaron Towlson. Would love your thoughts on it and if you'd like to see more of these to spark discussions  . Thanks!

Has anyone done a Box to O365 migration?  Looking for some ideas/thoughts.

Top Answer : I was not part of the infrastructure team that handled the migration, but our org moved ~100k accounts from Box to OneDrive/O365 last year. Overall it was a relatively uneventful transition for most end users, except for those who had built integrations using Box's uploader widgets and other workflows that could not be directly (or easily) reproduced in O365.

14 views
2 comments
0 upvotes
Related Tags
What's leading the trend towards greater open source database adoption?

Top Answer : True-Ups and Extortion from vendors like Oracle are common reasons, as well as more architectural flexibility

37 views
4 comments
1 upvotes
Related Tags
Future of Content and Records ManagementFuture of Content and Records Management

The future of content and records management is digital. How well are organizations doing this today? 100 IT Executives benchmark themselves against their peers.

0 views
0 comments
Related Tags
What are some best practices when working with dark data?

Top Answer : Make sure you are actually deleting the data. Don’t let it just pile up. Meaning make sure your dark days is always on your companies normal disposition schedule. Sometimes people forget and it’s not a part of your normal processes.

33 views
1 comments
Related Tags
I'm building most on... share "why" in comments...

Top Answer : Virtually nose-to-nose here out the gate, would be great to hear some arguments for/against your choice...  thanks for participating in the poll - I recently joined Pulse so we can put that interview we were planning in my past life on permanent hold ;)  - any additional thoughts here? Thanks!

State of Data OperationsState of Data Operations

The report was conducted as a deep dive into data operation opportunities and challenges for over 150 IT Executives.