Viewing posts tagged Security and Economics
the-price-of-managerial-neglect
Posted by: admin 12 years, 1 month ago
I would think that this kind of research would be applicable to Information Security:
willingness-to-take-risk-a-learned-trait-corporate
Posted by: admin 12 years, 1 month ago
Cognitive Daily pointed me to an article about risk preferences and it's deceptive headline. The research is interesting to from two perspectives:
"With regard to willingness to take risks children are astonishingly similar to their parents," is how the Bonn economist Professor Armin Falk sums up the results. "This is not only true for the overall estimate, but also for the different categories. There are people, for example, for whom no mogul piste is too steep when skiing, but who invest their money in secure government bonds. An identical risk profile can often be found with their children."From a corporate standpoint, it would seem to indicated that while a company (as represented by it's senior management and employees) may be very conservative in its investment strategy, it may be willing to take enormous risks in information security.
Recent Posts
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
- 5.0 Released!
- Docker repository for the WiKID Strong Authentication server
- New Amazon EC2 image on marketplace
Archive
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)