{"id":43154,"date":"2023-05-15T13:38:21","date_gmt":"2023-05-15T13:38:21","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=99185"},"modified":"2023-05-15T13:38:21","modified_gmt":"2023-05-15T13:38:21","slug":"cloud-professionals-overly-attached-to-password-based-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cloud-professionals-overly-attached-to-password-based-security\/","title":{"rendered":"Cloud professionals \u2018overly attached to password-based security\u2019"},"content":{"rendered":"<p>Most cloud professionals remain overly attached to the use of passwords despite their inherent security vulnerabilities, value as a target for threat actors, and widespread frustrations around password hygiene requirements.&#160; This is one of the key findings from research conducted by Beyond Identity, a provider of passwordless, phishing-resistant MFA. The survey of more than 150<a class=\"excerpt-read-more\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/2023\/may\/15\/cloud-professionals-overly-attached-to-password-based-security\/\" title=\"ReadCloud professionals &#8216;overly attached to password-based security&#8217;\">&#8230; Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/2023\/may\/15\/cloud-professionals-overly-attached-to-password-based-security\/\">Cloud professionals &#8216;overly attached to password-based security&#8217;<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.cloudcomputing-news.net\/\">Cloud Computing News<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most cloud professionals remain overly attached to the use of passwords despite their inherent security vulnerabilities, value as a target for threat actors, and widespread frustrations around password hygiene requirements.&#160; This is one of the key&#8230;<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6133,104],"tags":[118],"class_list":["post-43154","post","type-post","status-publish","format-standard","hentry","category-beyond-identity","category-cloud-computing","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=43154"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43154\/revisions"}],"predecessor-version":[{"id":43155,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43154\/revisions\/43155"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=43154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=43154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=43154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}