Viewing posts from January, 2009
open-source-applications-we-have-reached-the-laugh
Posted by: admin 14 years, 10 months ago
I am always amazed at the lack of understanding about how open source business models can work.
in-omoha-call-911-on-smokers
Posted by: admin 14 years, 10 months ago
Via Overlawyered.com:In Omaha, which recently enacted a restaurant smoking ban, authorities are urging vigilant citizens who notice illicit smoking to call 911 to summon a police response. The local emergency coordinator has objected, saying 911 calls over smoking could overwhelm the system and distract dispatchers from more dire emergencies, but the police department says it is sticking by its advisory.
or perhaps, you could just ask the person not to smoke. Then, if you get your ass kicked, call the police.
oracle-buys-thor
Posted by: admin 14 years, 10 months ago
Oracle bought Thor, which I thought was very interesting. As Pete Lindstrom pointed out, it was a busy week for security-related acquisitions. This post at Digital ID World (hat tip to Venture Chronicles sums up my thoughts. I wonder if Oracle will go after RSA? I have my doubts. Oracle is just really going after Sun, IBM, etc.incentive-plan-for-an-information-security-team
Posted by: admin 14 years, 10 months ago
It has occurred to me that you could develop an interesting incentive program for an information security team, assuming that you believe a couple of data points (or can come up with your own) and your primary concern is a data breach. In my opinion, security people are all too often incented only to maintain security - not to optimize the investment in security. Interests need to be aligned.
creative-triangulation-for-mobile-payment-systems
Posted by: admin 14 years, 10 months ago

Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)