Viewing posts tagged Strong Authentication
banks-seek-tighter-security-from-vendors
Posted by: admin 16 years, 9 months ago
According to today's WSJ, 6 big US banks and BITS will announce security standards for their vendors. This action shouldn't come as a surprise, since the banks are essentially following in the footsteps of VISA and Mastercard and their CISP/PCI standards that attempt to secure the credit card industry - especially since the banks own VISA and Mastercard.customer-generated-content
Posted by: admin 16 years, 9 months ago
I'm extremely pleased with the recent customer growth we've had at WiKID. In particular, I'm pleased with the community that has developed, mostly on the #wikid IRC channel. While the PCI security requirements for merchants and payment processors continue to be a big driver for adoption of two-factor authentication, we see a great variety of deployment scenarios. We've tried to address the innumerable network configurations by writing what I think is a large number of how to add two-factor authentication to... whatever documents.
etrade-to-deploy-rsa-tokens-but-does-it-stop
Posted by: admin 16 years, 9 months ago
ETrade announced that they would be offering RSA SecurID key fob tokens to account holders with more than $50,000 in assets.how-information-security-creates-value
Posted by: admin 16 years, 9 months ago
Today I read a blog at NCircle (found via the prolific Adam Shostack) about security as a business enabler. It's an interesting post, but to me it shows that information security people often fail to understand how value it created.
how-about-stop-using-social-security-numbers-as
Posted by: admin 16 years, 9 months ago
Today I read on Martin McKay's blog that you should change your default passwords and Adam Shostack has pointed out that colleges should usen't use SSNs to track students.Recent Posts
- Blast-RADIUS attack
 - The latest WiKID version includes an SBOM
 - WiKID 6 is released!
 - Log4j CVE-2021-44228
 - Questions about 2FA for AD admins
 
Archive
2024
2022
- December (1)
 
2021
2019
2018
2017
2016
2015
2014
- December (2)
 - November (3)
 - October (3)
 - September (5)
 - August (4)
 - July (5)
 - June (5)
 - May (2)
 - April (2)
 - March (2)
 - February (3)
 - January (1)
 
2013
2012
- December (1)
 - November (1)
 - October (5)
 - September (1)
 - August (1)
 - June (2)
 - May (2)
 - April (1)
 - March (2)
 - February (3)
 - January (1)
 
2011
2010
- December (2)
 - November (3)
 - October (3)
 - September (4)
 - August (1)
 - July (1)
 - June (3)
 - May (3)
 - April (1)
 - March (1)
 - February (6)
 - January (3)
 
2009
- December (4)
 - November (1)
 - October (3)
 - September (3)
 - August (2)
 - July (5)
 - June (6)
 - May (8)
 - April (7)
 - March (6)
 - February (4)
 - January (427)
 
2008
- December (1)
 
Categories
- PCI-DSS (2)
 - Two-factor authentication (3)
 
Tags
- wireless-cellular-mobile-devices (7)
 - Two-factor authentication (10)
 - Wireless, cellular, mobile devices (6)
 - NPS (1)
 - Phishing and Fraud (111)
 - Active Directory (1)
 - pam-radius (3)
 - privileged access (2)
 - Cloud Security (10)
 - Mutual Authentication (60)
 - Web Application Authentication (1)
 - Authentication Attacks (99)
 - pci (50)
 - Security and Economics (97)
 - WiKID (133)
 - pam (2)
 - VPN (1)
 - Installation (2)
 - RADIUS Server (1)
 - Open Source (64)
 - Tutorial (2)
 - Strong Authentication (35)
 - Information Security (137)
 - Transaction Authentication (13)
 - Miscellaneous (100)
 - Linux (2)
 - transaction-authentication (6)
 - Two Factor Authentication (254)
 
