Viewing posts from January, 2009
incent-for-the-averages-insure-against-the
Posted by: admin 15 years, 8 months ago
One the comments on Emergent Chaos about my post Incentive plan for an information security team was from Andrew Jaquith of the Yankee Group:
embedding-wikid-two-factor-authentication-in-your
Posted by: admin 15 years, 8 months ago
One of our customers, Online Banking Solutions offers banks and financial institution software for commercial account management. They have embedded WiKID for two-factor session authentication and mutual https authentication in both the server side and on their optional client. The combined client facilitates the initial validation process, performs session authentication using the one-time passcode and performs mutual https authentication to prevent MITM attacks.
educational-security-incidents-year-in-review
Posted by: admin 15 years, 8 months ago
The Educational Security Incidents Year in Review - 2007 is out. As Adam points out, not everyone cares that incidents were up 67.5%. I'm not sure that I would either - the total number of incidents was 139, which seems small relative to the number of colleges and universities out there. My guess is that the incidents have to make it to the news. Perhaps incidents are becoming less news-worthy.
comments-on-pete-lindstroms-rosi-post
Posted by: admin 15 years, 8 months ago
I'm short on time, but I did want to do a quick post about Pete Lindstrom's post on ROSI. He makes a good point about effieciencies. But there are three ways a company creates value:danger-in-the-skies-legos
Posted by: admin 15 years, 8 months ago
It's Geekdad vs. Nato in a Battle for the Skies!.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)