Viewing posts tagged Miscellaneous
from-the-what-goes-around-comes-around-dept
Posted by: admin 16 years, 1 month ago
The AP is reporting that a laptop in a stolen car contained personal information on alledged identity thiefs:
Many of the people whose data were compromised were being investigated for possible fraud and identity theft, said Joel Winston, associate director of the FTC's Division of Privacy and Identity Theft Protection.
garage-door-authentication-they-cannot-steal-what
Posted by: admin 16 years, 1 month ago
The Washington Post has an article about garage door openers not working around Quantico due to a denial of service attack by the Marines and consumers wanting to get money from the Marines.
google-authentication
Posted by: admin 16 years, 1 month ago
Google released a couple of interesting products (as beta, natch). The first is their hosted email service, which allows enterprises to outsource their mail services to Google.
google-does-saml-but-has-anyone-done-it-plus
Posted by: admin 16 years, 1 month ago
I see that Google is allowing SAML for Apps for Domains. Anybody test this yet? I hope to get a chance to soon.
Measuring-Managing-whatever
Posted by: admin 16 years, 1 month ago
How big is the government? Nobody knows:
As anticipated, the federal government flunked its audit for fiscal 2006, with $797 billion, or 53 percent, of its reported assets and an additional $790 billion, or 27 percent, of net costs, on the balance sheets of five agencies that could not be fully audited.....
As it did last year, the Government Accountability Office cited three major shortcomings: financial management problems at the Defense Department, an inability to account for and to reconcile balances that cross agency lines and an ineffective process for preparing financial statements.Instead of debating whether we should be measuring the deficit against GDP or if deficits matter at all or pointing out that there is no way to measure the net benefit of a new aircraft carrier, how about just showing that you know, and therefore in some way value, what you have as assets? Auditing is like blocking and tackling. If you don't care enough to do the basics, you will never win.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)