Viewing posts tagged Security and Economics
anton-chuvakin-on-roi
Posted by: admin 16 years, 3 months ago
I was fixing to post on some of the ROI posts floating around, with my usual usual dainty prose. But Anton Chuvakin did a much better job than I could - though it appears he has a ringer on his team.
How-much-to-spend-on-data-breach-protection
Posted by: admin 16 years, 3 months ago
In a previous post, I discussed how much to spend on information security based on Gordon & Loeb's book Managing Cybersecurity Resources: A Cost-Benefit Analysis. The crux: spend no more than 37% of your expected loss.
incent-for-the-averages-insure-against-the
Posted by: admin 16 years, 3 months ago
One the comments on Emergent Chaos about my post Incentive plan for an information security team was from Andrew Jaquith of the Yankee Group:
great-another-prom-i-wont-get-invited-to
Posted by: admin 16 years, 3 months ago
Though I look forward to reading The New School Information Security.
software-liability-a-bad-idea-that-will-come-too
Posted by: admin 16 years, 3 months ago
Time for me to weigh in on the subject of liability for software bugs. Bruce Schneier posted about it here, and Pete Lindstrom responded here. I agree with Lindstrom. It is an incredibly bad idea. Software liability laws will increase the costs of software development so high that it will drive small firms from the market, reduce customer choice resulting in less choice, less innovation and even worse software.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)