Viewing posts tagged Information Security
repurcussions-of-data-loss-at-ohio-university
Posted by: admin 16 years, 2 months ago
It's a long standing joke that no matter where you move, your alumni association can find you. That may change after OU's experience with their data breaches as chronicled here. Of course, they use your Social Security Number to track you down.
more-predictions-for-2006
Posted by: admin 16 years, 2 months ago
I already did some predications over on IDWorld. Of course, if I were afraid to fail I would have a real job. Here are more predictions for 2006:new-incentives-for-pci-compliance-from-visa
Posted by: admin 16 years, 2 months ago
Visa's CEO hinted during a keynote speach that Visa may be looking at increasing incentives for PCI compliance.
Coghlan’s reference to incentives for compliance with the Payment Card Industry data-security standard follows a year that saw major hacker breaches of databases containing sensitive card information, including PINs for debit cards. “We need to do a better job with data security,” Coghlan said.
more-on-the-disappearing-perimiter
Posted by: admin 16 years, 2 months ago
Kim Cameron on the disappearing Perimeter:
The perimeter of the enterprise is dissolving in an environment requiring greater collaboration, oursourcing and integration with both suppliers and customers.
not-bad-for-a-cubicle-on-strong-authentication
Posted by: admin 16 years, 2 months ago
Not Bad for a Cubicle has a post on strong authentication - more blogging driven by Bruce Schneier's posts. It's well balanced and insightful.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)