Viewing posts by admin
georgian-kangaroos-protected-by-dhs
Posted by: admin 16 years, 3 months ago
For those of you who think Georgia is filled with nothing but lead-poisoned moonshine drinkers and has torn down everything worth preserving (well, I think Sherman started the trend) and therefore would not be worthy of federal funds from DHS, I ask you: What about our Kangaroos?
bw-on-opensource-in-2005
Posted by: admin 16 years, 3 months ago
Business Week has great round up of their open source stories for 2005 along with predictions for '06.chertoff-shocker
Posted by: admin 16 years, 3 months ago
From the Borowitz Report:CHERTOFF LOCKS HIMSELF OUT OF HOMELAND SECURITY HEADQUARTERS
willingness-to-take-risk-a-learned-trait-corporate
Posted by: admin 16 years, 3 months ago
Cognitive Daily pointed me to an article about risk preferences and it's deceptive headline. The research is interesting to from two perspectives:
"With regard to willingness to take risks children are astonishingly similar to their parents," is how the Bonn economist Professor Armin Falk sums up the results. "This is not only true for the overall estimate, but also for the different categories. There are people, for example, for whom no mogul piste is too steep when skiing, but who invest their money in secure government bonds. An identical risk profile can often be found with their children."From a corporate standpoint, it would seem to indicated that while a company (as represented by it's senior management and employees) may be very conservative in its investment strategy, it may be willing to take enormous risks in information security.
congratulations-to-openid
Posted by: admin 16 years, 3 months ago
for winning the 2007 Disruptor Award
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)