Viewing posts from March, 2009
How to use WiKID two-factor authentication on a Netgear 312
Posted by: admin 15 years, 6 months ago
If anyone has a Netgear SSL312, can you confirm what I see in their Prosafe documentation (pdf): That WiKID is an authentication option?
The UK's Government Connect program
Posted by: admin 15 years, 6 months ago
The UK government has rolled out an information security program called Government Connect focusing on increasing the security of connections between local governments and the central governments. To be approved local governments need to meet the Code of Connection (aka CoCo), which requires two-factor authentication.
Two-factor authentication on Slackware
Posted by: admin 15 years, 6 months ago
We now have a how-to on running WiKID two-factor authentication on Slackware. This content was contributed by a customer, just like the tutorial on running WiKID on Ubuntu.
A tale of two headlines
Posted by: admin 15 years, 6 months ago
Today's InfoWorld Security newsletter contained two headlines:
How to compensate employees to align incentives with shareholders
Posted by: admin 15 years, 7 months ago
There's been lots of discussions about bonuses recently, Merrill Lynch, AIG, on and on. So many, I won't bother linking. These bonuses are typical of what is known as an agency problem. The executives are agents for the shareholders, but their incentives are not aligned. You can imagine that the executives of a company that is about to be sold or taken over by the government are even more incented toaward legally binding bonuses before any transaction which might result in their termination. I have a simple proposal to fix this (in the future):
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)