Tuesday, December 31, 2019

Word of the Day: Have I Been Pwned (HIBP)

Word of the Day WhatIs.com
Daily updates on the latest technology terms | December 31, 2019
Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP) is a website that allows users to search and find out if an email address's password has been compromised by data breaches. The service is a popular and commonly-used tool in IT security.

As a database service compiled from known leak sites, the service allows users to quickly check to see if a particular email account has been compromised by a data breach. The database is compiled from crawls of a number of websites and database dumps. Some of these sites are believed to purchase account information from hackers.

HIBP was created after a large data breach at Adobe in October 2013. Since the site's creation, HIBP has become legitimized as a security tool by tech-savvy users to keep their information safe. Corporations trying to assist users after data breaches also sometimes offer HIBP links in notification emails.

Have I Been Pwned was created and independently run by Troy Hunt, a Microsoft Regional Director. In June 2018, it was announced that HIBP had partnered with Mozilla Firefox and 1Password to integrate the service into new products.

Pwn is a hacker/gamer variation on the word own and a leet speak term meaning to defeat overwhelmingly or to dominate.

Quote of the Day

 
"Using Have I Been Pwned as a tool to increase your situational awareness on the status of current major breaches is an added way to keep yourself and your organization safe." - Matt Pascucci

Learning Center

 

Collection #1 breach data includes 773 million unique emails
A new trove of 773 million unique emails -- known as the Collection #1 breach data -- gathered from various data breaches were added to Have I Been Pwned, but there are questions about the freshness of the data.

Have I Been Pwned integration comes to Firefox and 1Password
Both Firefox and 1Password announced new Have I Been Pwned integration to help users discover if email addresses have been compromised in known data breaches without disclosing personal information.

Firefox Monitor offers breach alerts on visited websites
Mozilla has begun rolling out a new feature of Firefox Monitor, which will provide breach alerts when a user visits a recently compromised website, based on data provided by Have I Been Pwned.

Risk & Repeat: Who's to blame for bad passwords?
This Risk & Repeat podcast examines a recent Twitter debate between Duo Security's Wendy Nather and Troy Hunt, owner of Have I Been Pwned, over bad passwords. Are users who create and reuse weak passwords mostly to blame or are the technical systems that allow the behavior the primary cause?

How should security teams handle the Onliner spambot leak?
Expert Matt Pascucci explains what actions enterprises should take after a list of 711 million user credentials was stolen by the Onliner spambot.

Quiz Yourself

 
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

Amazon's influence and its next big push beyond cloud computing

 
Cloud Computing Digest
A roundup of cloud infrastructure content from TechTarget's network |December 31, 2019
TechTarget
FEATURED STORY
Amazon's growth strategy could target 5 key markets
by Chris Kanaracus, Senior News Writer

Amazon could move well beyond its core e-commerce and cloud services businesses in pursuit of growth, targeting markets such as publishing, health care and travel.

Advertisement
NEWS
 
Amazon supply chain model disrupts entire industry

Amazon has conditioned consumers to get goods as quickly as possible, which has affected the global supply chain industry from top to bottom, including inventory management and logistics.

 
Amazon stores struggle to move from the cloud to solid ground

Looking for new kingdoms to conquer, Amazon is aggressively moving into physical retail locations. This time the e-commerce giant may face tougher competition. 

EXPERT ADVICE
 
Experts' cloud predictions for 2020

This was a big year for cloud computing progress, so what's in store for 2020? See what our contributors predict for security, containers and more in the new year.

 
Get the lowdown on these 4 Google Cloud management services

Google Cloud Platform offers numerous tools to manage and deploy resources -- each with its own specific focus. Learn about these four services before you get started on Google Cloud.

 
How to calculate your cloud TCO

Unsure what it'll cost to run your workloads in the cloud? Define your parameters in order to get up and running and avoid costly surprises.

 
5 steps to kick-start your cloud incident response strategy
At this point, a cloud incident management strategy is not optional for enterprises working in the cloud. Review these best practices to ensure your team is well-prepared.
 
AWS monitoring best practices extend beyond CloudWatch

AWS users can choose from a range of native tools to monitor their environments – but a combination of these services will ultimately produce the best results.

 
Perform an AWS security assessment with these tips and tools
Cloud security is an ongoing process that demands regular checks for potential vulnerabilities. Use tools such as Amazon Inspector to perform frequent and thorough cloud security assessments.
 
Follow these experts' advice on AWS migration best practices

Before you migrate to the AWS cloud, learn from those who've made the move before. These migration best practices cover resource planning, costs, testing and more.

 
Compare AWS CDK vs. CloudFormation for infrastructure as code
Infrastructure as code has become a big part of the cloud development process. Learn how the AWS CDK addresses the weaknesses of CloudFormation and improves automation on AWS.
About This E-Newsletter
The Cloud Computing Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

Embedded analytics case study

TechTarget
Business Technology Research     December 31, 2019
TechTarget
IN THIS ISSUE
Embedded analytics case study
SPONSORED BY: Yellowfin
As a global fintech organization, UnderwriteMen needed to be able to provide detailed data insights to insurers as part of their reinsurance process. Download this case study to explore the numerous capabilities UnderwriteMe gained when they decided to use an embedded analytics platoform.
Case study: Unified communications for better customer service
SPONSORED BY: Nextiva
With a customer-centric focus, injury law firm West Coast Trial Lawyers needed a communications system to match—which is why they chose to implement Nextiva. Learn about the law firm's experience in this brief case study, and find out how it helped them.
How to remain compliance with ASC 606
SPONSORED BY: Fusebill
Read this white paper to learn how you can utilize an automated billing and management platform that will enable you to remain consistently compliant with the new ASC 606 regulation—as well as maximize revenue and operations scaling.
Computer Weekly – 19 March 2019: How IT leaders should work with marketing
SPONSORED BY: ComputerWeekly.com
In this week's Computer Weekly, experts advise on how IT and marketing chiefs can work together to deliver a high-quality customer experience. We examine how supercomputers are transforming science by processing large-scale data analytics. And we look at a key ethical aspect of AI – how to explain the decisions an AI makes. Read the issue now.
6 necessary features you need form an e-signature tool
SPONSORED BY: Adobe Sign
Download this e-signature overview which outlines a 10-point checklist for e-signature compliance, and 6 features you should prioritize when making a buying decision.
This newsletter is published by TechTarget, Inc.
275 Grove Street, Newton, Massachusetts, 02466 US

Click to: Unsubscribe

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List below, as described in our Privacy Policy. For additional assistance, please contact: webmaster@techtarget.com

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

What features does your BI dashboard lack?

TechTarget
Business Technology Research     December 31, 2019
TechTarget
IN THIS ISSUE
What features does your BI dashboard lack?
SPONSORED BY: Yellowfin
Many businesses use business intelligence or data analytics platforms. However, businesses are not convinced that BI dashboards are providing them with the insights that they need. Read this research report for the full analysis on the use of BI dashboards and where they are falling short.
Benefits of the Citrix-Microsoft relationship
SPONSORED BY: Citrix
Download this resource to learn how a Citrix-Microsoft partnership can provide the capabilities your IT team needs to deploy digital workspaces more quickly, effectively and securely.
Computer Weekly – 12 March 2019: How a 144-year-old retailer is moving into the digital age
SPONSORED BY: ComputerWeekly.com
In this week's Computer Weekly, we talk to the CIO of Liberty, one of London's oldest and most traditional retailers, about moving into the digital, omnichannel age. Our latest buyer's guide looks at best practice in threat management. And we examine the results of our exclusive reader research on 2019 IT buying priorities. Read the issue now.
Use this vendor comparison to decide who can help your SaaS model adaptability
SPONSORED BY: Fusebill
So, you know you need to be more adaptive and flexible with your subscription offerings—now what? You can use this cheat sheet for a customer-driven comparison of 3 leading vendors to decide if any of their solutions can work for you.
Don't stumble through your next refresh cycle: Here's how
SPONSORED BY: Dell EMC
Hardware refreshes are a key responsibility of IT departments, but there are no carved-in-stone rules about when or where infrastructure needs to be updated. Learn how to read between the lines of workload data to strategically determine refresh timing and ideal technology choices.
This newsletter is published by TechTarget, Inc.
275 Grove Street, Newton, Massachusetts, 02466 US

Click to: Unsubscribe

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List below, as described in our Privacy Policy. For additional assistance, please contact: webmaster@techtarget.com

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget