Articles on Authentication
- Malware Protect Processes from Spyware With Windows Integrity Levels Windows mandatory integrity levels (Low/Medium/High) can protect against keyloggers. User-mode malware typically runs at Medium level; launching sensitive applications like password vaults with "Run...
- Authentication Better Internal Vulnerability Scanning With Authentication Authenticated vulnerability scans provide far more comprehensive results than anonymous scans by allowing the tool to examine installed applications, patches, and configurations. Create dedicated...
- Authentication Critical Log Review Checklist for Security Incidents This checklist covers log review for incident response and routine monitoring: copy logs centrally, minimize noise by removing benign entries, verify timestamps, focus on changes and failures, work...
- Social Networking Security Scoreboard - "Yelp" for Enterprise Security Products?
- Social Networking Why On-line Social Identity and Reputation is a Big Deal Online social identity is defined by your network and interactions—you are whom you know and what you do with them. A Social Identity Reputation Score (SIRS) could become the FICO score of the online...
- Authentication Facebook's One-Time Passwords: Why? Facebook's OTP feature replaces passwords for public computer logins rather than adding a second factor. It addresses keyloggers on kiosks but not common attack vectors like session cookie theft or...