Viewing posts tagged Strong Authentication
where-you-are-as-an-authentication-factor
Posted by: admin 16 years, 4 months ago
Not Bad for a Cubicle has posted about location as an authentication factor.why-you-need-strong-authentication-wiki
Posted by: admin 16 years, 4 months ago
I have come across a number of sites across the Internet that discuss why strong authentication is a good idea and many go into good detail (such as http://mongers.org/authentication , but I haven't ever seen a broad discussion of the reasons why in one place.a-response-to-bruce-schneiers-the-failure-of-two
Posted by: admin 16 years, 4 months ago
I certainly agree with many parts of the recent essay and the interview on Computer World by Bruce Schneier, but I think it misses on a few key points and borders on pandering for press.buyability-and-usability
Posted by: admin 16 years, 4 months ago
Today we turned on online purchasing for WiKID Strong Authentication licenses. It is a bit of an experiment in "buyability". A big hat tip to Dharmesh Shah's post on Usability vs. Buyability to clarify this point for me. We had focused on ease of use. We have provided ASP scripts that automate the two-factor roll-out process, for example and have an incredibly easy to use Web-interface on the WiKID server (IMHO - another hat tip to Brian Dame ;). We have attempted to take the risk out of buying WiKID by having an open-source version and by having a trial version of the commercial server available for download from the extranet. And we have set up a way to test the WiKID two-factor tokens without even providing an email address.
another-plug-for-strong-authentication
Posted by: admin 16 years, 4 months ago
A great analogy: strong authentication is like Penicillin for your network securityRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)