Viewing posts by admin
authentication-article-on-searchsoftwarequality
Posted by: admin 16 years, 3 months ago
I forgot to mention that I have an article up on SearchSoftwareQuality: Stronger authentication needed for Web applications. Here's the gist:
In this article we consider three authentication processes in a typical complex Web application that requires security, such as online banking or brokerage transactions:
one-time-passwords-and-credit-cards
Posted by: admin 16 years, 3 months ago
I am so confused about this piece of advice from Garner's Avivah Litan:
article-published
Posted by: admin 16 years, 3 months ago
I had an article published, this time over as SearchSecurity. Attacks illustrate need for stronger authentication.
assessing-brand-damage
Posted by: admin 16 years, 3 months ago
Tim Erlin started a discussion about brand damage. However, the data he used was really about stock prices, not "brand", which is much harder to quanitify (and it's not easy to qauntify the affects of breach on stock price).
mobile-phone-usage-studies
Posted by: admin 16 years, 3 months ago
Hat tip to Daniel about Nokia's study regarding 3G cell phone usage. Unfortunately, it looks like the report is no longer available.Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)