Viewing posts tagged Information Security
surprise-hipaa-audits-on-the-way
Posted by: admin 14 years, 2 months ago
The U.S. Department of Health and Human Services has hired PriceWaterhouseCoopers to conduct surprise audits of hospitals for HIPAA compliance:
Its complaint-driven, says Runyon, noting that Tony Trenkle, director of the Centers for Medicare & Medicaid Services at HHS, last month publicly said the first 10 or so reviews will be at hospitals where CMS received complaints about security.
identity-theft-hits-3-percent-in-2004
Posted by: admin 14 years, 2 months ago
Security Focus has the article about the DOJ Survey on the number of US citizens hit by identity theft, but Security Curve puts it in perspective
the-express-scripts-bounty
Posted by: admin 14 years, 2 months ago
Now this could be interesting. Express Scripts is offering $1,000,000 reward for information leading to the arrest and conviction of the attacker trying to blackmail them. That is a lot of Ameros.
hsbc-issues-warning-to-180000-regarding-a-security
Posted by: admin 14 years, 2 months ago
The WSJ Online is reporting that HSBC has issued warnings to 180,000 of it's customers that a security breach may have resulted in their data being compromised.
how-much-will-a-breach-cost-you-find-out-online
Posted by: admin 14 years, 2 months ago
I'm telling you, this internet thing is something. There is now an online calculator - from a company selling cyber-insurance - to help you estimate the cost of a data breach or identity theft data loss scenario . While I am also impressed with java script, I think their data loss archive needs some work.
Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)