Viewing posts tagged Information Security
finding-ebay-phishers-through-reverse-social
Posted by: admin 16 years ago
Here's one of those "of course, now that I see it, it makes perfect sense" ideas: Finding Ebay fraudsters through social networks. Track who has given positive feedback to scammers. Whoever else they have given positive feedback is probably a scammer too.
value-protection-and-information-security
Posted by: admin 16 years ago
There is a very interesting article (and old one - sorry, I'm running behind) on CSO Online called Value Made Visible about how American Water's Bruce Larson has developed a security metric call Value Protection:
The basic Value Protection metric is a ratio that looks like this: Value Protection = Normal Operations Cost ($) – Event Impact ($) / Normal Operations Cost ($). In formula:
firewalls-and-immigration
Posted by: admin 16 years ago
I've been a bit surprised by the lack of discussion amongst security bloggers about the immigration bills being batted about in Congress. I don't want to start any flame wars about the definition of 'amnesty' or anything, I just think that the community could help keep the country from spending an insane amount of (borrowed) money on a "security" fence along the Mexican border.
deperimeterization
Posted by: admin 16 years ago
Over on Not Bad for a Cubicle, Thurston has a post discussing deperimeterization and the recent Jericho Forum meeting he attended.I think my favorite quote of the day came from Nick Bleech, CSO of Rolls-Royce, who said, “Deperimeterization is happening. It’s not a strategy, it’s an ‘-ization.’ It’s like globalization–it’s happening.”
voting-hackable-or-error-prone-you-decide
Posted by: admin 16 years ago
Hat Tip: MSNBC First Read: The SciFi channel has a page up that displays voting mechanism by state. It's quite jazzy, but I have one problem with the methodology. Mainly that they seem to think that if it's electronic, it's hackable but not error prone. While they do have a page discussing the pros and cons of the voting machines, they don't rank them that way on the map.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)