Archive for the ‘Access Control’ Category

Why You Should Be Using a Password Manager

Password managers such as LastPass offer a simple service: They will store all your annoying passwords (and help you generate new ones if needed) and then give them out to whatever service you’re logging into through the use of browser add-ons and apps. They’re much like the password tools already built into your browser itself—the […]

Leave a Comment

What to Log for Authentication and Access Control

Authentication and access control plays a critical role in web application security.  Mostly for logging, all authentication and access control events should be logged which includes but not limited to successes and failures. If  we are logging only the successful events, someone may brute force attack the passwords without any detection or notice. On the […]

Leave a Comment

Compartmentalizing and Segmenting Privileged Passwords

By Liberman Software @ Identity Week If you’re a fan of old war movies – and especially if you’re a child of the Cold War – then you no doubt recall watching scenes where prior to launching a nuclear missile, two operators will turn their launch keys simultaneously in order to initiate the launch. The […]

Leave a Comment

Looking for a secure USB stick with hardware encryption

CESG Approved USB Stick CESG is the UK Government’s National Technical Authority for Information Assurance Over 1 million SafeSticks are now in use in the NHS helping to keep patient data and other confidential data secure! Buy your SafeStick today! SafeStick is a secure USB stick with AES 256 bit hardware encryption and is FIPS […]

Comments (5)

TSA Is NOT Security It’s A JOKE!

“Security measures that just force the bad guys to change tactics and targets are a waste of money,” said Bruce Schneier, “It would be better to put that money into investigations and intelligence.” The security boss of Amsterdam’s Schiphol Airport is calling for an end to endless investment in new technology to improve airline security. […]

Comments (1)

Network Access Control and Security

The purpose of network access control is to protect and safeguard assets attached to network from threats of unauthorized users gaining access to organization’s assets. Network Access Control (NAC) authenticate users to make sure they are authorized to login and following the policies and procedures for login before authorized to use organization assets. Some of […]

Comments (2)

Access control fraud and countermeasures

These days access to the internet is a business requirement. Most businesses are selling their products and services on the internet which sometimes requires customers to have access to the critical assets such as applications and databases. The global growth of the internet has increased complexity and potential risks to these assets. In some cases, […]

Comments (2)