Viewing posts tagged WiKID
wikid-in-top-10-open-source-infosec-project-list
Posted by: admin 15 years, 7 months ago
It's great to get noticed, especially when you're number 4 and the project in front of you is Sourcefire.
Recent regulatory changes have heightened interest in two-factor authentication systems for corporate security and online banking. WiKID uses open-source software and everyday cell phones, PDAs, and other handheld devices to generate one-time passwords that are as secure (and more convenient) as hardware tokens. Price: $10 per person per year and up.I'm pretty sure that both Vyatta, and Untangle support Radius, so you could easily combine WiKID with one of the top two for a very tight, low cost, remote access security solution.
wikid-in-the-news
Posted by: admin 15 years, 7 months ago
We got a nice mention at the InfoSec Conference in Orlando by Matthew Luallen, president of consulting firm Sph3r3:
“The WiKiD Strong Authentication Server is a two-factor authentication server,” said Luallen, referencing ones he thought among the most useful . Among other great security tools there for the asking are SpamAssassin, which can identify spam, Splunk for log analysis, NTop for anomaly detection, TrueCrypt for encrypting data at rest, and the penetration-testing tool BackTrack. He said all are examples of useful security tools that companies should consider securing enterprise networks.That's good company! We'll be sending Mathew the secret prize that everyone who mentions WiKID at a conference or in an article gets. It's very special and the only way to find out what it is is, of course, to mention WiKID (positively) in a speach or article.
winkin-wikid-and-openvpn
Posted by: admin 15 years, 7 months ago
One reason I haven't been posting is that I have been adding some Flash demos to the website.wikid-reviewed-by-sc-magazine
Posted by: admin 15 years, 7 months ago
I'm pleased that WiKID was included in a review by SC Magazine. You can see the review online now.wikid-strong-authentication-and-laws-of-identity
Posted by: admin 15 years, 7 months ago
Last week, I blogged about the flexibility of WiKID. Today, I want to apply that thinking to Kim Cameron’s Laws of Identity. How does WiKID’s flexibility support the Laws? Obviously, WiKID would only be a part of the identity system – the authentication piece. The question is how does WiKID enable this metatsystem to comply with the laws.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)