Skip to main content

The WiKID Blog

Viewing posts tagged Information Security

How to Increase the Likelihood that your Security Risk Recommendations are accepted

Via @adamshostack came this post by @lennyzeltser Why Business Managers Ignore IT Security Risk Recommendations.

Avoiding the creep factor in authentication

I have recently seen a number of WiKID competitors announced in the two-factor authentication market that seek to reduce the need for user interaction.

Defense at every stage

Another tweet struck me for it's common sense and truth:

Bridging Gunnar Gaps to create virtual circles

If you haven't read Gunnar Peterson's post Security, Fast and Slow, please do so now.  It is about how Security's natural tendencies grate the natural tendencies of Development.  Security needs to adapt to make it easier for Development to make the right decisions to bridges such gaps.  I now call these "Gunnar Gaps". 

New eGuide on Adding Two-factor Authentication to your Network

Multi-factor authentication is a key requirement for securing infrastructure, we have tried our best to make it less expensive and less of a headache for users and admins. We do a lot of work helping systems administrators integrate two-factor authentication. These efforts often involve supporting other products and we're ok with that. People ask us "Do you work with my VPN?" So we often produce tutorials on how to add two-factor authentication a specific product, like OpenVPN or a Cisco box or a Juniper UAC.

Recent Posts

Archive

2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom