Updating best practices for managing cyber risks . I sure hope that the engineers and design managers who design the security protocols for the various systems that I use pay attention to the work of the National Institute of Standards and Technology (NIST)’s Trusted Identities Group. Specifically, I pray that they will heed the recommendations in June 2017 release of new Digital Identity Guidelines, Authentication and Lifecycle Management ( NIST Special Publication 800-63B ), section 10.2.1 Memorized Secrets. “Memorized secrets” are “commonly referred to as a password or PIN.” By following these recommendations, software security folks stand to make my digital life easier and, apparently, more secure. Complexity does not solve all problems. Usability matters. For many years I worked for an organization that rigorously enforces computer security: regular change of complex passwords, shut down desktop and laptop computers every n...