Posted by:
admin
16 years, 3 months ago
My friend Ed Rackley has a quote from Blake in his sig line:
'A dog starv'd at his Master's gate predicts the ruin of the State...' -- Blake
I thought of this quote this morning while listening to the news. Atlanta, in addition to not having any water has no gasoline. It was the first time I thought of myself as the dog.
How does this relate to information security? As I noted in May of 2006:
There are other reasons to promote teleworking: disaster preparedness. And as last year's gas Katrina-related gas shortages showed, it's not just about keeping your workforce working in a distributed fashion. Emergency teleworking can reduce gas consumption. In Georgia last year after Katrina, the governor closed public schools for a day to reduce diesel consumption. Of course, this was incredibly annoying to families with children for obvious reasons.So, here we are again in a shortage with absolutely no plan to promote teleworking or a coordinated effort to decrease fuel usages. The interesting thing is that we have done exactly that in Atlanta. During the Olympics the streets were empty. Obviously, we don't need empty streets, but a little push would no doubt go a long way.
On top of all this, my bank failed.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)