Viewing posts from January, 2009
visa-adds-carrot-to-stick-for-pci-goulash
Posted by: admin 16 years, 1 month ago
This will be interesting to look back on in a year: Visa is creating a $20,000,000 bonus pool to incent their members to be PCI compliant. :
Visa's new Visa PCI Compliance Acceleration Program is designed to spur entities that are covered by PCI rules to comply in a speedy fashion, said Jennifer Fischer, a director with Visa USA. "This program is part of our larger strategy for protecting card holder data and to ensure that we are doing everything we can to protect it from compromise," she said.Why is it needed? Because:
Though nearly 18 months have passed since PCI rules went into full effect, only 36% of Tier 1 merchants and 15% of Tier 2 merchants are currently compliant with the requirements, according to Visa.I think this might be the more effective bit:
At the same time, acquiring banks that fail to ensure compliance by Sept. 30, 2007 will be assessed fines starting at $5,000 a month for each non-compliant merchant. The fines increase to $25,000 per month for each non-compliant merchant after Dec. 31, 2007. Until now, fines have only been assessed in cases where actual data breaches occurred.That will get them going!
visibility-and-pci-security
Posted by: admin 16 years, 1 month ago
I'm a fan the PCI security standard from Visa, Mastercard and American Express. It is a tight in all the right ways and loose in the right ways. It tells credit card processors and merchants explicity that they must use two-factor authentication for remote access, but nothing more. If PCI has a problem, it is that it will be too little too late to protect card holder data and stave off regulation. The structure of the credit card industry makes it tough for it to be otherwise. Will making retailers liable for credit card breaches help? I'm not sure.
voting-hackable-or-error-prone-you-decide
Posted by: admin 16 years, 1 month ago
Hat Tip: MSNBC First Read: The SciFi channel has a page up that displays voting mechanism by state. It's quite jazzy, but I have one problem with the methodology. Mainly that they seem to think that if it's electronic, it's hackable but not error prone. While they do have a page discussing the pros and cons of the voting machines, they don't rank them that way on the map.
we-are-71
Posted by: admin 16 years, 1 month ago
According to eSecurity Planet, the WiKID Strong Authentication System is number 71 of the top 75 Open Source Security Apps. Actually, the ranking seems to be random. We are one of two entries under the "User Authentication" section and the sections are listed alphabetically. So, if our category had been "Authentication", we would have been 12th, just after Anti-spyware. :)
why-you-need-two-factor-authentication-for-ssh
Posted by: admin 16 years, 1 month ago
I've been chewing on doing a post about the need for two-factor authentication SSH for a while, long enough that someone else has done the work for me, which is just the way I like it.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)