Viewing posts from January, 2009
how-to-secure-vnc-remote-access-with-two-factor
Posted by: admin 14 years, 10 months ago
I've written another how-to for Howtoforge. This article describes how to combine WiKID and NoMachine's NX products to secure VNC. It should be noted that NoMachine offers a lot more functionality and speed than just tunneling VNC through SSH. It is incredibly fast and allows for remote X and RPD in addition to VNC. They have a version that is free for two concurrent connections.
how-to-thwart-laptop-facial-recognition-systems
Posted by: admin 14 years, 10 months ago
hsbc-accuses-competitors-of-competing
Posted by: admin 14 years, 10 months ago
From ZDNet UK:
Speaking at the Gartner IT Security Summit 2006, Brendan Pickering, group head of fraud technology at HSBC, accused rival banks of getting into an "arms race" approach to authentication.What is next? Lowering interest rates to gain market share? Having people in a branch? Advertising? Where will it stop?
hsbc-issues-warning-to-180000-regarding-a-security
Posted by: admin 14 years, 10 months ago
The WSJ Online is reporting that HSBC has issued warnings to 180,000 of it's customers that a security breach may have resulted in their data being compromised.
infoworld-on-how-to-become-a-great-information
Posted by: admin 14 years, 10 months ago
Consistency, covering the basics and using metrics Great article for all management, not just information security. When problems crop up in management, it is usually because either we stopped doing some basic thing like cross-department meeting or it could have easily been avoided by implementing some new simple thing.
Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)