The WiKID Blog, musings on two-factor authentication, information security and some other stuff.
fbi-director-robert-mueller-on-npr
Posted by: admin 16 years, 3 months ago
Listen to the interview online..
computer-crime-and-security-survey-shows-increase
Posted by: admin 16 years, 3 months ago
The annual CSI survey is (almost) out and it shows a big increase in reported costs. Companies reported average annual losses of $350,424 in the past year, up sharply from the $168,000 they reported the previous year.
marginal-revolution-on-vaccinations
Posted by: admin 16 years, 3 months ago
People who have the flu spread the virus so getting a flu shot not only reduces the probability that I will get the flu it reduces the probability that you will get the flu. In the language of economics the flu shot creates an external benefit, a benefit to other people not captured by the person who paid the costs of getting the shot. The external benefits of a flu shot can be quite large. Under some conditions each person who is vaccinated reduces the expected number of other people who get the flu by 1.5.Perhaps we have been taking the wrong tack thinking about how to punish PC users who have malware on their machines.. Maybe offering additional benefits to users with verifiable security mechanisms is a better solution. Maybe one of those benefits would be access to IRC channels often used by malware to contact their controller.
Measuring-Managing-whatever
Posted by: admin 16 years, 3 months ago
How big is the government? Nobody knows:
As anticipated, the federal government flunked its audit for fiscal 2006, with $797 billion, or 53 percent, of its reported assets and an additional $790 billion, or 27 percent, of net costs, on the balance sheets of five agencies that could not be fully audited.....
As it did last year, the Government Accountability Office cited three major shortcomings: financial management problems at the Defense Department, an inability to account for and to reconcile balances that cross agency lines and an ineffective process for preparing financial statements.Instead of debating whether we should be measuring the deficit against GDP or if deficits matter at all or pointing out that there is no way to measure the net benefit of a new aircraft carrier, how about just showing that you know, and therefore in some way value, what you have as assets? Auditing is like blocking and tackling. If you don't care enough to do the basics, you will never win.
a-response-to-bruce-schneiers-the-failure-of-two
Posted by: admin 16 years, 3 months ago
I certainly agree with many parts of the recent essay and the interview on Computer World by Bruce Schneier, but I think it misses on a few key points and borders on pandering for press.Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)