Viewing posts from January, 2009
hedge-fund-management-and-information-security
Posted by: admin 16 years, 1 month ago
Been a long time since I posted anything. I'm trying to get back into the swing.flaw-in-mail-list-compromises-password-file
Posted by: admin 16 years, 1 month ago
There are a number of things that make passwords increasingly unusable. One of the biggest problems with passwords is that you're supposed to use different ones for different systems. It's a no-no to use the same password in multiple places because if one gets compromised, then the other systems are compromised.
forget-air-marshalls-its-time-for-air-cavaliers
Posted by: admin 16 years, 1 month ago
Due to the dramatic increase in passengers carrying 4 foot swords on US commercial aircraft, it is time we dropped the Air Marshall program and instituted the Air Cavaliers. I might be biased , but I think it would be much more dramatic. The Air Cavaliers would be under cover of course, but when danger appeared they would remove their peasant costume in a flourish to reveal their grandiose Cavalier regalia.
incentive-plan-for-an-information-security-team
Posted by: admin 16 years, 1 month ago
It has occurred to me that you could develop an interesting incentive program for an information security team, assuming that you believe a couple of data points (or can come up with your own) and your primary concern is a data breach. In my opinion, security people are all too often incented only to maintain security - not to optimize the investment in security. Interests need to be aligned.
downtime-expected
Posted by: admin 16 years, 1 month ago
We're moving offices tomorrow (9/11/08) and expect to have some downtime while we migrate the servers. We will be down from 2:00 PM to 6:00 PM EDT. Thanks for your patience. This will affect mail and the certificate servers.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)