Viewing posts tagged Security and Economics
risk-and-effectiveness-for-project-evaluation
Posted by: admin 14 years, 10 months ago
Gunnar Peterson has a post from Metricon about Bryan Ware's presentation about combining the effectiveness of a solution and the risk involved. I couldn't find the link to the actualy presentation. (I didn't have the time to go through them all.)
I think I would tie the effectiveness of the proposed security solution to the cost of capital of the overall project. It would be interesting to tie Bryan's work with my "work" on estimating the cost of capital for an information security project.
spire-on-low-frequency-high-impact-events
Posted by: admin 14 years, 10 months ago
Compare this Spire Security post to my previous post about hedge fund risks to see who has the better sense of humor.software-liability-a-bad-idea-that-will-come-too
Posted by: admin 14 years, 10 months ago
Time for me to weigh in on the subject of liability for software bugs. Bruce Schneier posted about it here, and Pete Lindstrom responded here. I agree with Lindstrom. It is an incredibly bad idea. Software liability laws will increase the costs of software development so high that it will drive small firms from the market, reduce customer choice resulting in less choice, less innovation and even worse software.
hedge-fund-management-and-information-security
Posted by: admin 14 years, 10 months ago
Been a long time since I posted anything. I'm trying to get back into the swing.tax-credits-for-telecommuting
Posted by: admin 14 years, 10 months ago
The state of Georgia is offering tax credits for setting up telecommuting programs. Find our more at the Clean Air Campaign website.
Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)