The WiKID Blog, musings on two-factor authentication, information security and some other stuff.
Two-factor authentication for twitter
Posted by: admin 10 years, 11 months ago
New Drupal two-factor module released - CMS authentication issues
Posted by: admin 11 years ago
WiKID is pleased to annouce the release of a two-factor authentication module for Drupal.
Big Data vs Easy Data: The WiKID OSSIM plugin
Posted by: admin 11 years, 1 month ago
Big data is all the hype right now, but what most companies need is not big data but easy data. The truth is that most average-sized organizations do not even monitor the logs that the collect. That's changing as log management and monitoring are required as part of PCI compliance. Enterprises need log management tools.
Local governments adopting two-factor authentication, but at what cost?
Posted by: admin 11 years, 1 month ago
I found this article on local governments deploying two-factor authentication to be sadly typical. First, it's great that local governments are deploying two-factor authentication, even if it is forced by FBI CJIS security policies that require the use of two-factor authentication for remote access to the national criminal justice database. However, the article states:
The boy who cried "PWNAGE"!
Posted by: admin 11 years, 2 months ago
Imagine a mono-culture where you can write in one programming language and one language only and it runs anywhere. Such a language makes life a lot easier for developers and software vendors. It also would make life easier for security people. Instead of worrying about the latest holes in PHP, Ruby, Python and Java, you only have to patch one. All the eggs are in one basket, but, man, are we focused on that basket.
Recent Posts
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
Archive
2024
- January (1)
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)