Blog Posts Tagged with "Authentication"

4c1c5119b03285e3f64bd83a8f9dfeec

Single Sign On – Prem vs Cloud

October 12, 2010 Added by:Ben Kepes

While it’s probably fair to say that the majority of enterprises targeted by Passlogix are Windows shops, there are parallel trends occuring – one is the move to online applications that solve a point problem and give some autonomy to individual business units outside of IT...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Just In Time for Fall: Introducing Touchdown Tasks

October 07, 2010 Added by:Brent Huston

Each month, we focus on a specific, measurable task you can use to firm up your own security strategy. The tasks focus on authentication credentials to identify and remove all network, system and application access that does not require secure authentication credentials or mechanisms...

Comments  (0)

5c9886924588e138cc18290742c2095e

More on Twelve Character Passwords

October 05, 2010 Added by:Guy Huntington

Obtaining passwords is so easy using social engineering that it negates the use of a password with special characters and X length. When I go onto client sites one of the first things I do is look under keyboards, behind the screens etc, where I usually find the password written down...

Comments  (3)

9fd81843ad7f202f26c1a174c7357585

Phone Jamming and Your Security

July 30, 2010 Added by:Guy Pace

Financial institutions set up a number of security questions to try to positively identify you when you call. Unfortunately, most of the standard questions are very lame, and the answers are easy to find...

Comments  (0)

46d1980e375ce08915b30d9a328c2fdc

Default, Blank and Weak Username/Passwords

July 22, 2010 Added by:Application Security, Inc.

Application Security, Inc.’s Team SHATTER has researched the Top 10 Database Vulnerabilities in order to you with the most up-to-date vulnerabilities, risk and remediation information. Today’s topic is Default, Blank & Weak Username/Passwords...

Comments  (0)

04f75408812398c1b907d10e22aac579

Open Betas for IPD Guides Available for Download

July 18, 2010 Added by:Jay Ferron

The Infrastructure Planning and Design guide for Microsoft Forefront Identity Manager (FIM) 2010 provides actionable guidance for designing a FIM 2010 infrastructure...

Comments  (1)

4e714dc795dc50b932e2a837e3efc472

Configuring Security in Glassfish v3

July 17, 2010 Added by:Joe Morrissey

Configuring a security realm in Glassfish v3 to tie in with your pre-existing MySQL database for user credentials is actually easier than you might think...

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

Credit Card Connoisseur

July 08, 2010 Added by:Ron Baklarz

This authentication mechanism could be compromised and moreover, I would very much like to see the security scheme around the kiosk's ability to protect the PII associated with the driver's license as well as the PCI-DSS protections since the machines will accept credit and debit cards...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Personal Knowledge or “Qualifying Questions” as Authenticators

May 03, 2010 Added by:Robert Siciliano

How many times have you forgotten a password? Fortunately the website you were on only needed your username or an email address and they would respond with a few questions for you to answer. Once you responded with what was in the system you then re-set your password and you’re in.  Easy peazy.

Comments  (2)

634ff692af43fd4dc5dab3b8590c77d6

Under illumination variations, exploiting 3D image for ‘Face Authentication’ in Biometrics…

May 02, 2010 Added by:K S Abhiraj

This article shows some of the basic techniques through which, Biometic authentication worked before.. and a basic mean how it could be crooked up, for gaining authentication. Automatic recognition of human faces is extremely useful in a wide area of applications, such as face identification for security and access control, surveillance of public places, mug shot matching and other commerc...

Comments  (0)

D97bed96d5646177251e99b9567b1392

Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Enhanced Authentication Now Available on Infosec Island

February 17, 2010 Added by:Infosec Island Admin

Infosec Island™, the new community for IT and information security professionals, today announced that its new enhanced authentication service based on the SyferLock™ GridGuard™ solution, is now live.

Comments  (5)

A3e8b5e0becdbfb1b1c706b452b6c388

Road Map for an Application/Software Security Architect (Part 5)

December 30, 2009 Added by:Stephen Primost

Without a Digital Identity, how would you expect to do any authentication? And with an incomplete Digital Identity, how would you expect to get the authorization done correctly? Without the proper data model and the expectation that it would have the correct data (besides being in the right place at the right time), securing a system is impossible, although having the information, it is the easies...

Comments  (0)

Page « < 9 - 10 - 11 - 12 - 13 > »