So I ran across this article and it was just "wow" about how some people manage their passwords. Now I've seen the stickies ...
- Brian
- No Comment
Are We Getting Closer to Universal Authenticators?
So I've talked a lot about how you can use 2FA within your organization, and how it could have solved some big ...
- Brian
- No Comment
Goodbye Spock, you will be missed
So on a personal note, I had to mention the death of Leonard Nimoy yesterday (nice obit here). I remember watching Star ...
- Brian
- No Comment
Location becomes a factor in 2FA
As I’ve said before, there are many things that could be used as a factor for authentication, and I think this may ...
- Brian
- No Comment
Sometimes 2FA is hidden, but it’s still there
Now this isn’t something new, but I thought that the description of what some banks do to secure your login is a ...
- Brian
- No Comment
Remember: Compliance does not equal security
I was thinking about the push for compliance that we always hear about: “I need to be compliant to XYZ for reason ...
- Brian
- No Comment
Healthcare Breach of 70M Records
Late on Wednesday, it was confirmed that Anthem, the second largest health insurer in the U.S., was breached (ransacked is the word ...
- Brian
- No Comment
Don’t Let the GHOST Catch You
Yesterday, Qualys announced a new vulnerability called GHOST. (Since Shellshock, everyone thinks vulnerabilities need to be named.) This vulnerability is in a ...
- Brian
- No Comment
GreenRADIUS v1.2.1.1
Patches to glibc to eliminate issues from GHOST have been implemented. Based on the current information available on the GHOST threat, GreenRADIUS should ...
- Brian
- No Comment
So easy you don’t need a manual
I ran across this great article about the disappearance of instruction manuals and thought about how today (as noted in the article, ...