Viewing posts from January, 2009
stock-market-values-and-information-security
Posted by: admin 14 years, 10 months ago
There has been some excellent research done on the impact of information security breaches on the market cap of affected firms (which directly impacts their cost of capital): "The economic cost of publicly announced information security breaches: empirical evidence from the stock market Katherine Campbell, Lawrence A. Gordon, Martin P. Loeb and Lei Zhou Accounting and Information Assurance, Robert H. Smith School of Business, University of Maryland, 2003" (http://brief.weburb.dk/archive/00000130/01/2003-costs-security-on-stockvalue-9972866.pdf)
This UMD study found that a firm suffering a breach of 'confidential information' saw a 5% drop in stock price while firms suffering a non-confidential breach saw no impact.
banks-thinking-strategically-about-security
Posted by: admin 14 years, 10 months ago
Bank Lawyer's Blog has an interesting post about an American Banker editorial (apparently not available online) about the new FFIEC guidelines for stronger authentication for online banking.WiKID-breaks-8-000-downloads-on-Sourceforge.net
Posted by: admin 14 years, 10 months ago
Sometime yesteday we surpassed 8,000 downloads of the open source version of our two-factor authentication system on Sourceforge. That is pretty exciting.
congrats-to-obs
Posted by: admin 14 years, 10 months ago
One of our OEM partners is really on a roll. Online Banking Solutions announced deals this week with Bank of Hawaii and First Tennessee . Keep it up!
another-plug-for-strong-authentication
Posted by: admin 14 years, 10 months ago
A great analogy: strong authentication is like Penicillin for your network securityRecent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)