Viewing posts from January, 2009
why-you-need-strong-authentication-wiki
Posted by: admin 15 years, 7 months ago
I have come across a number of sites across the Internet that discuss why strong authentication is a good idea and many go into good detail (such as http://mongers.org/authentication , but I haven't ever seen a broad discussion of the reasons why in one place.wikid-als-u-tevreden
Posted by: admin 15 years, 7 months ago
The latest WiKID token client supports French and Dutch, because phishing is not just for English speakers ;).
wikid-and-pptp
Posted by: admin 15 years, 7 months ago
One of the new features of the the 3.0 release of the WiKID Strong Authentication System is support for MS-CHAPV2, which is required for PPTP. Now that it's in there, we have published a how-to on integrating two-factor authentication from WiKID and Poptop, the popular open source Linux-baed PPTP VPN server.
wikid-in-top-10-open-source-infosec-project-list
Posted by: admin 15 years, 7 months ago
It's great to get noticed, especially when you're number 4 and the project in front of you is Sourcefire.
Recent regulatory changes have heightened interest in two-factor authentication systems for corporate security and online banking. WiKID uses open-source software and everyday cell phones, PDAs, and other handheld devices to generate one-time passwords that are as secure (and more convenient) as hardware tokens. Price: $10 per person per year and up.I'm pretty sure that both Vyatta, and Untangle support Radius, so you could easily combine WiKID with one of the top two for a very tight, low cost, remote access security solution.
wikid-in-the-news
Posted by: admin 15 years, 7 months ago
We got a nice mention at the InfoSec Conference in Orlando by Matthew Luallen, president of consulting firm Sph3r3:
“The WiKiD Strong Authentication Server is a two-factor authentication server,” said Luallen, referencing ones he thought among the most useful . Among other great security tools there for the asking are SpamAssassin, which can identify spam, Splunk for log analysis, NTop for anomaly detection, TrueCrypt for encrypting data at rest, and the penetration-testing tool BackTrack. He said all are examples of useful security tools that companies should consider securing enterprise networks.That's good company! We'll be sending Mathew the secret prize that everyone who mentions WiKID at a conference or in an article gets. It's very special and the only way to find out what it is is, of course, to mention WiKID (positively) in a speach or article.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)