Viewing posts tagged Security and Economics
new-incentives-for-pci-compliance-from-visa
Posted by: admin 12 years ago
Visa's CEO hinted during a keynote speach that Visa may be looking at increasing incentives for PCI compliance.
Coghlan’s reference to incentives for compliance with the Payment Card Industry data-security standard follows a year that saw major hacker breaches of databases containing sensitive card information, including PINs for debit cards. “We need to do a better job with data security,” Coghlan said.
new-non-profit-educational-discounts-plus-pay-what
Posted by: admin 12 years ago
Today we announced a new pricing program for home users: pay what you want. This variable payment plan for home users is based on the recent bands that have tested this system (Radiohead and NIN). But the trigger was also the free for home use offer for SSL-Explorer>. I have, of course, seen a lot of free for home use enterprise software and we may yet go there. But I also believe that this should be an interesting experiment.
open-source-momentum-and-spending-during-the
Posted by: admin 12 years ago
Hat Tip: Slashdot, From ComputerWorld:
problems-with-the-pci-security-standard
Posted by: admin 12 years ago
Mark Curphey has some thoughts about the problems with the PCI security standard and it looks like he is just getting started. I would like to also point out a comment left by an anonymous poster (probably because he or she makes a living doing PCI audits) in a previous post on PCI:
The problem with the Visa PCI standard is that Visa/MC have a vested interested in keeping the business flowing. The entity that is responsible for answering Visa is the issuing bank. The retailer is responisible to the issuing bank. The reports are filed with the issuing banks and shared with Visa. The problem with this structure is that all parties have a financial interest in keeping the business flowing. It takes a serious public violation, like card systems, for Visa/Issuing Banks to drop a vendor.
reason-for-drop-in-cost-of-e-crime-now-clear
Posted by: admin 12 years ago
I have always been puzzled as to why the total cost of e-crime dropped in the most recent CSI/FBI crime survey. Now the reason is clear: online crime is no longer predominately the purvue of lonely teens seeking self-esteem, it is increasingly being propogated by organized crime gangs selling access to 'owned' machines. Since they only need 5,000-10,000 machines per sale, that is all they get. If they got more than that it increases the possibility of exposure, reducing the value of those machines.Recent Posts
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
- 5.0 Released!
- Docker repository for the WiKID Strong Authentication server
- New Amazon EC2 image on marketplace
Archive
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)