Viewing posts tagged Two Factor Authentication
20-000-downloads
Posted by: admin 16 years, 1 month ago
We have crossed the 20,000 download threshold on Sourceforge.net.
15-percent-of-corporate-pcs-have-keystroke-loggers
Posted by: admin 16 years, 1 month ago
According to David Aucsmith, architect and CTO, Security Business & Technology Unit at Microsoft, 15% of corporate PCs have key stroke loggers.
100-percent-open-source
Posted by: admin 16 years, 1 month ago
One of our customers is attempting to go 100% open source, which factored heavily in their choice of WiKID for two-factor authentication. They liked our "appliance in an ISO" model, but were not so fond of our use of Java :)
two-factor-for-foodies
Posted by: admin 16 years, 1 month ago
Consider how much stronger this form of two-factor authentication for access to a "private club is over single-factor authentication:
we-are-71
Posted by: admin 16 years, 1 month ago
According to eSecurity Planet, the WiKID Strong Authentication System is number 71 of the top 75 Open Source Security Apps. Actually, the ranking seems to be random. We are one of two entries under the "User Authentication" section and the sections are listed alphabetically. So, if our category had been "Authentication", we would have been 12th, just after Anti-spyware. :)
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)