Viewing posts by admin
determining-an-appropriate-cost-of-capital-for-an
Posted by: admin 14 years, 8 months ago
In my first post, I discussed the short-comings of ROI as an analysis tool for information security projects because it doesn't include a cost of capital. Using a cap rate will increase the accuracy of your analysis, but how do you come up with a good cap rate?
wikid-strong-authentication-3-0-rc1-rpms-released
Posted by: admin 14 years, 8 months ago
Just a quick note about our 3.0 RC1 RPM release: Please test it!. We should have a new ISO and VMWare image by Monday or Tuesday of next week.
tjx-sales-not-affected-by-breach
Posted by: admin 14 years, 8 months ago
Continuing the discussion about Brand Damage,breach costs and The PCI security standards, TJX reported higher sales despite suffering the largest breach known. Same store sales increased 6%, higher than analysts expected. Consumer sentiment seem to confirm my contention that information security is not a key element of the TJX brand:
repurcussions-of-data-loss-at-ohio-university
Posted by: admin 14 years, 8 months ago
It's a long standing joke that no matter where you move, your alumni association can find you. That may change after OU's experience with their data breaches as chronicled here. Of course, they use your Social Security Number to track you down.
schwarzenegger-vetoes-pci-esque-legislation
Posted by: admin 14 years, 8 months ago
Legislation that would have made merchants responsible for card-reissuance and other identity theft costs was vetoed by Gov. Schwarzenegger.
Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)