Viewing posts from January, 2009
comment-status
Posted by: admin 16 years, 10 months ago
As with every blog out there, we've been battling comment and trackback spam. I had turned off comments altogether, but now have turned them back on. Comments are still protected by WiKID Strong Authentication, but you can add a comment anonymously. Here's how to do it:
How-much-to-spend-on-data-breach-protection
Posted by: admin 16 years, 10 months ago
In a previous post, I discussed how much to spend on information security based on Gordon & Loeb's book Managing Cybersecurity Resources: A Cost-Benefit Analysis. The crux: spend no more than 37% of your expected loss.
How-to-get-an-unlimited-information-security
Posted by: admin 16 years, 10 months ago
In the past, I have blogged about how much to budget for info sec, how information security creates value for a company, and other posts designed to help info sec personnel make their case. Well, now I have decided that that is all bunk compared to the advice I am about to give. The new tactic: Bribery.
drive-by-pharming-seen-in-the-wild
Posted by: admin 16 years, 10 months ago
Symantec has spotted Drive-by pharming attacks in the wild
tjx-sales-not-affected-by-breach
Posted by: admin 16 years, 10 months ago
Continuing the discussion about Brand Damage,breach costs and The PCI security standards, TJX reported higher sales despite suffering the largest breach known. Same store sales increased 6%, higher than analysts expected. Consumer sentiment seem to confirm my contention that information security is not a key element of the TJX brand:
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)
