Viewing posts by admin
banks-thinking-strategically-about-security
Posted by: admin 15 years, 4 months ago
Bank Lawyer's Blog has an interesting post about an American Banker editorial (apparently not available online) about the new FFIEC guidelines for stronger authentication for online banking.herman-munsters-identity-stolen
Posted by: admin 15 years, 4 months ago
As if you needed more proof that identity thieves are lowly scum, they have now stolen Herman Munster's identity. If they had any class at all, they would have gone for Gomez Adams.
congratulations-to-local-boys-spi-dynamics
Posted by: admin 15 years, 4 months ago
on their acquisition by HP and to me, since I was an early angel investor in SPI - so long ago I cannot remember what year it was. Their application to the ATDC had just been rejected as they were viewed as 'unreceptive to coaching', IIRC. I was an entrepreneur-in-residence at ATDC at the time, so it must have late 2000. For what it's worth, they were indeed unreceptive to coaching, except from Brian Cohen who has done a great job as CEO.
security-through-lingual-obscurity
Posted by: admin 15 years, 4 months ago
On a recent trip to Mexico, our casita had a safe in it. The instructions for using it and the combination were printed on a covered sheet of paper sitting on top of the safe. As I scanned for directions on how to change the combination, I read:
security-and-oil
Posted by: admin 15 years, 4 months ago
I've been reading The Prize by Daniel Yergen. I've wanted to read it for quite some time and just ran across a copy at a yard sale. It is excellent. I'm about half-way through.
Recent Posts
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
Archive
2024
- January (1)
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)