Skip to main content

The WiKID Blog

Viewing posts from January, 2009

when-phishing-and-stolen-customer-database

Check out this phish email from Virus List

We fully appreciated not only the expert social engineering and well-written text, but also the fact that the phisher included not only the email of the intended victim, but also the postal address.

where-are-you-on-the-normal-curve-of-information

I recently was goaded into joining the IT Policy Compliance Group so I could read their research report entitled Taking Action to Protect Sensitive Data.

where-you-are-as-an-authentication-factor

Not Bad for a Cubicle has posted about location as an authentication factor.

why-people-forget-new-passwords

Because your brain is wired that way:

According to a new study, the brain only chooses to remember memories it thinks are most relevant, and actively suppresses those that are similar but less used, helping to lessen the cognitive load and prevent confusion.
An example of this is when passwords are changed. The new passwords are similar and thus surpressed. It takes repetition to get the new password to be remembered, probably just in time for it to be changed.

why-roi-is-a-crappy-measure-for-information

At a number of recent events and discussion forums the topic of ‘selling’ security investments to top management has been addressed. The question posed is that if there is no positive return from a security investment, how do security professionals propose a security solution to a CFO or CEO? What is the return on a strong authentication, a firewall or IDS system that neither saves money (except perhaps in employee time, an argument that may fall on deaf ears) nor generates revenue? Importantly to me, how can you justify the investment in strong authentication? The answer lies in what really creates value for an enterprise.

Recent Posts

Archive

2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom