Viewing posts tagged Information Security
data-leakers-suffer-8-percent-drop-in-revenue
Posted by: admin 16 years ago
Computer World has an article about a recent study by the IT Policy Compliance Group which offers some interesting data points:
- Organisations that experience publicly reported data breaches suffer an 8% loss of revenue.
- Compounding the revenue and customer losses are additional expenses averaging US$100 per lost or stolen customer record to notify customers and restore data.
- Best-in-class organisations are monitoring and measuring controls and procedures to protect sensitive data once a week, while most firms are conducting such measurements only about once every 176 days.
why-you-need-two-factor-authentication-for-ssh
Posted by: admin 16 years ago
I've been chewing on doing a post about the need for two-factor authentication SSH for a while, long enough that someone else has done the work for me, which is just the way I like it.
web-application-insecurity-statistics
Posted by: admin 16 years ago
Security geeks who like to chew on numbers will enjoy the WebAppSec Statistics. Lots of pretty pictures too.
where-are-you-on-the-normal-curve-of-information
Posted by: admin 16 years ago
I recently was goaded into joining the IT Policy Compliance Group so I could read their research report entitled Taking Action to Protect Sensitive Data.
why-people-forget-new-passwords
Posted by: admin 16 years ago
Because your brain is wired that way:
According to a new study, the brain only chooses to remember memories it thinks are most relevant, and actively suppresses those that are similar but less used, helping to lessen the cognitive load and prevent confusion.An example of this is when passwords are changed. The new passwords are similar and thus surpressed. It takes repetition to get the new password to be remembered, probably just in time for it to be changed.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)