Viewing posts tagged Two Factor Authentication
hsbc-accuses-competitors-of-competing
Posted by: admin 16 years, 3 months ago
From ZDNet UK:
Speaking at the Gartner IT Security Summit 2006, Brendan Pickering, group head of fraud technology at HSBC, accused rival banks of getting into an "arms race" approach to authentication.What is next? Lowering interest rates to gain market share? Having people in a branch? Advertising? Where will it stop?
authentication-requirements-for-cyber-insurance
Posted by: admin 16 years, 3 months ago
I was looking at AIG's IT Self Assesment (Doc file) and I have a question:
how-to-thwart-laptop-facial-recognition-systems
Posted by: admin 16 years, 3 months ago
interesting-analysis-of-passmarks-technology
Posted by: admin 16 years, 3 months ago
Adam has pointed out a friend's new blog who has a set of interesting new blog posts, most about security and some about authentication and one in particular about Passmark's Sitekey - now deployed by Bank of America - and the issues he has with it. They fall into two categories: user interaction predictions and securityhow-to-secure-vnc-remote-access-with-two-factor
Posted by: admin 16 years, 3 months ago
I've written another how-to for Howtoforge. This article describes how to combine WiKID and NoMachine's NX products to secure VNC. It should be noted that NoMachine offers a lot more functionality and speed than just tunneling VNC through SSH. It is incredibly fast and allows for remote X and RPD in addition to VNC. They have a version that is free for two concurrent connections.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)