Viewing posts tagged Cloud Security
WiKID support for Cloudstack
Posted by: admin 12 years, 3 months ago
We're pleased to announce the release of a prototype authentication plugin for Cloudstack that will add WiKID Two-factor authentication to the administrator login. The jar is available for download at our Sourceforge site. The license is GPL. We have very brief installation instructions as well.
Where to keep the keys?
Posted by: admin 12 years, 7 months ago
Lori MacVittie has a great post over Devcentral at F5 about the current state of Identity for Cloud. It is well worth a read.
ViTM - The Vendor in the Middle
Posted by: admin 13 years, 5 months ago
Enterprise security architects are traditionally very wary of systems that rely on 3rd parties for access, uptime or security. Ironically, many of these same architects deployed RSA SecurID systems not considering (or heavily discounting) the fact that RSA kept copies of the seeds for licensing purposes.
WiKID Strong Authentication Community Edition on the Amazon Cloud
Posted by: admin 13 years, 5 months ago
We have created a public AMI version of the WiKID Strong Authentication System for Amazon's EC2 cloud offering. While it is quite simple to install WiKID on a Redhat or Ubuntu linux AMI, we hope that this will make it even easier for people to learn about two-factor authentication.
An Analysis of the Inevitable Analyses of the Gawker Password Breach
Posted by: admin 13 years, 11 months ago
Here we go again. Another attack results in a password file being posted on the Internet. Queue the analysis of the password file. State how users always choose the simplest passwords and cannot be trusted with their own security choices. Of course, this is a great time for WiKID to note that two-factor authentication solves this problem.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)