Viewing posts tagged pci
PCI DSS disses multi-step authentication
Posted by: root in PCI-DSS 7 years, 7 months ago
The PCI Council has published an "Information Supplement" on multi-factor authentication (pdf). The document that multi-step and mutl-factor authentication are not the same and that the former is not acceptable.
NIST deprecates SMS as an out-of-band authentication method
Posted by: root 8 years, 2 months ago
When we started WiKID, we looked at using SMS to deliver one-time passcodes. We chose not to for the simple reason that there was no way we could control the encryption and thus demonstrate the security of our solution to customers. There wasn't any data about the possible risks or probabilities of failures (except for reliability/delivery percentages) We looked to basic security design principles and best practices when we developed WiKID. Could we control the encryption? Could we generate the keys on the devices instead of using shared-secrets?
Non-Console Administrative Access
Posted by: root 8 years, 6 months ago
Now that PCI-DSS 3.2 is live, we have been pondering how hard it will be to implement the new multi-factor authentication requirements. First some definitions from the PCI Glossary:
Scalability notes for the WiKID Strong Authentication server
Posted by: admin 9 years ago
Large two-factor authentication deployments are becoming more and more common these days as enterprises deploy it to more and more employees . We're also seeing more SaaS providers needing to meet regulations such as HIPAA and PCI. These enterprises have large user bases and need scalable, reliable, affordable two-factor authentication. We have the affordable part covered (you can see our pricing online) and we are highly incented to provide reliable software thanks to our annual subscription license. But how scalable is WiKID?
Why you need a stand-alone two-factor authentication server
Posted by: admin 9 years, 1 month ago
We do a fair amount of testing and documentation for commercial and open-source VPNs (Cisco, SonicWall, Sophos, Checkpoint, etc, etc). Increasingly, we see VPNs embedding some type of two-factor authentication into their product. The idea is to make it simple to add 2FA to your VPN services, a laudable goal and perhaps sufficient for some small organizations. So, when should you consider using a stand-alone service instead?
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)