Viewing posts tagged Miscellaneous
more-on-teleworking-and-disaster-preparedness
Posted by: admin 15 years, 10 months ago
Echoing my last post, GovExec.com points out that federal plans for telework during disasters are sadly lacking.
The ability of federal agencies to continue critical operations during large-scale emergency situations would be significantly enhanced with widespread use of telework, but few have made the necessary preparations, officials told a congressional panel Thursday.
password-on-post-it-note-reveals-affair
Posted by: admin 15 years, 10 months ago
According to ComputerWeekly's Downtime blog, a password on a post-it note allowed a temp to access email of a London mayor's office staffer, revealing an affair with a married woman. Downtime's take:
Downtime expects Ken to have already ordered a two-factor authentication scheme to protect those afflicted with short-term memory difficulties, banned 3M’s best-selling product and instructed HR to re-do the background checks to weed out anyone with a malicious sense of humour.
picking-open-source-winners-according-to-zdnet
Posted by: admin 15 years, 10 months ago
Dana Blankenhorn has written about picking winners in open source that starts with a reference to Secretariat. I love horse racing. I spent two summers in my youth as a hot-walker in southern California for a trainer named Willard Proctor. A hot walker walks horses around in a circle, either just to get them out of the stall or to cool them down after they come off the track. It's the lowest position in the backside of any track. The best trainers still use people though and not machines. Our barn was next to Charlie Whittingham's.quoted-in-bloomberg-and-some-wireless-ranting
Posted by: admin 15 years, 10 months ago
I have a rather meaningless quote in a nice summation on Bloomberg about the RIM/NTP fracas.sha1-broken
Posted by: admin 15 years, 10 months ago
According to a number of places, but primarily Bruce Schneier, SHA-1 has been broken by a team of researchers in China. It's not time to panic if you're using it, but it is time to start thinking about a replacement.Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)