Viewing posts tagged Information Security
surprise-hipaa-audits-on-the-way
Posted by: admin 16 years ago
The U.S. Department of Health and Human Services has hired PriceWaterhouseCoopers to conduct surprise audits of hospitals for HIPAA compliance:
Its complaint-driven, says Runyon, noting that Tony Trenkle, director of the Centers for Medicare & Medicaid Services at HHS, last month publicly said the first 10 or so reviews will be at hospitals where CMS received complaints about security.
infoworld-on-how-to-become-a-great-information
Posted by: admin 16 years ago
Consistency, covering the basics and using metrics Great article for all management, not just information security. When problems crop up in management, it is usually because either we stopped doing some basic thing like cross-department meeting or it could have easily been avoided by implementing some new simple thing.
the-express-scripts-bounty
Posted by: admin 16 years ago
Now this could be interesting. Express Scripts is offering $1,000,000 reward for information leading to the arrest and conviction of the attacker trying to blackmail them. That is a lot of Ameros.
hsbc-issues-warning-to-180000-regarding-a-security
Posted by: admin 16 years ago
The WSJ Online is reporting that HSBC has issued warnings to 180,000 of it's customers that a security breach may have resulted in their data being compromised.
how-much-will-a-breach-cost-you-find-out-online
Posted by: admin 16 years ago
I'm telling you, this internet thing is something. There is now an online calculator - from a company selling cyber-insurance - to help you estimate the cost of a data breach or identity theft data loss scenario . While I am also impressed with java script, I think their data loss archive needs some work.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)