Skip to main content

The WiKID Blog

The WiKID Blog, musings on two-factor authentication, information security and some other stuff.

The Phoenix Project

The short version: read Gene Kim, Kevin Behr & George Spafford's The Phoenix Project because it is a book you can't put down about IT services! Can you imagine?  That's really all you need to know.

How to not add two-factor authentication to your product

First, I want to say that I really, really support any application that adds support for two-factor authentication, especially if they do it right by using an open standard such as RADIUS.  That's why I was excited to see RADIUS support in VMWare View 5.1.  I decided to test it and add a tutorial to our growing collection.

Are most people doing two-factor authentication right?

Needless to say we're big proponents of two-factor authentication around here. We also have a pretty broad spectrum of customers from large service providers pushing two-factor authentication out to customer to small businesses doing security for the first time thanks/due to PCI requirements. A lot of infosec rock stars talk about how PCI should be a floor and without disagreeing, we first hand see companies reaching that floor, called by some the 'information security poverty line' and know that it is a big improvement.

BSides Wrap-up

Last Friday was the 3rd annual BSides Atlanta Information Security Conference. I think it came off pretty well. This blogpost is meant to help others as they plan out their BSides conferences and to remind us of things we want to do differently next year. These are just quick, initial thoughts.

UGa breach, "Secret Questions" and blaming the user

The University of Georgia announced an intrusion and a breach of 8,500 personnel records including full names, social security numbers and other data.  The attackers apparently reset the passwords of two IT workers who had access to personnel records using the password reset mechanism - they guessed or discovered the answer to secret questions.  "Secret questions" are an incredibly weak authentication mechanism.  We will likely see many more breaches like this.

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom