266 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
 
Latest 7 Posts
Backyard SSO Hero
Mon, Oct 20th 2014 11
How to Make an Authentication Cocktail
Fri, Oct 17th 2014 8
Breach Fatigue: Don’t Be a Victim
Tue, Oct 7th 2014 14
UPS Hacked!
Wed, Sep 17th 2014 14
The IT Professional vs. The Deadly Data Breach
Mon, Sep 15th 2014 6
You Have a Case of Identity Theft!
Mon, Aug 25th 2014 14
PayPal for Mobile: How Secure is Your PayPal Account?
Mon, Jul 21st 2014 9
Top 10
You Have a Case of Identity Theft!
Mon, Aug 25th 2014 14
UPS Hacked!
Wed, Sep 17th 2014 14
Breach Fatigue: Don’t Be a Victim
Tue, Oct 7th 2014 14
Backyard SSO Hero
Mon, Oct 20th 2014 11
More Compromised Students and Faculty
Thu, Jul 17th 2014 10
World’s Largest Beverage Company Compromised
Thu, Jan 30th 2014 9
Young Hacker Infiltrates High School Database
Wed, Jul 2nd 2014 9
PayPal for Mobile: How Secure is Your PayPal Account?
Mon, Jul 21st 2014 9
How to Make an Authentication Cocktail
Fri, Oct 17th 2014 8
Are You Only a Hacktivists Away from Chaos?
Wed, Apr 2nd 2014 7


Kimberly Johnson
Blog Title PistolStar's Authentication Blog
Blog Description Usability. Security. Auditing. Compliance.
Blog URL http://blog.pistolstar.us/blog
RSS Feed http://blog.pistolstar.us/blog/?feed=rss
Validate Feed feedvalidator.org or validator.w3.org
Feed Last Checked Jan 26, 2015 5:40:01 PM EST. Realtime Update:
Location Amherst, NH, USA


Recent Blog Posts
11
Backyard SSO Hero
Mon, Oct 20th 2014 8:13a   Larry Conroy
So, my neighbor, Penny, peaks her head over the fence and asks me what I think about this SSO stuff.  What makes her think I even want to chat in the first place . . . the game is on and I’m stuck out here?  Can’t she see all these leaves taunting me because the leaf blower won’t start?  A more appropriate discourse would have been something like, “Hey, my kids are looking for something to do. Can they rake your leaves for you?” But never the less, as I reluctantly get off my knees
8
How to Make an Authentication Cocktail
Fri, Oct 17th 2014 7:12a   Rob Bellefeuille
Who doesn’t enjoy a good cocktail? James Bond liked his “shaken, not stirred” and most like them “on the rocks.” All this talk of cocktails is making me thirsty! However, today we are not here to talk about drinking a delicious drink; we are here to talk about an authentication cocktail. What is an “authentication cocktail?” An authentication cocktail is the pairing of two separate two-factor authentication (2FA) one-time password (OTP) delivery methods to make a full-bodied authen
14
Breach Fatigue: Don’t Be a Victim
Tue, Oct 7th 2014 2:11p   Amber Ciarcia
In recent weeks, the largest bank in the United States, JP Morgan Chase & Co., has fallen victim to cybercriminals. Last Thursday, JP Morgan unveiled that hackers obtained stolen information from their customers.  This included personal information such as names, addresses, phone numbers, and e-mail addresses from over 76 million households and 7 million small businesses. Scary, right? One would think. According to a recent article from The Washington Post “Data breach fatigue follows two
14
UPS Hacked!
Wed, Sep 17th 2014 7:12a   Liana Lichtenwalner
“It was the best of times, it was the worst of times.” This famous quote from Charles Dickens’ classic novel, A Tale of Two Cities, gives insight into how two forces, like good and evil, are equal rivals contending for survival. The same goes for the world of cyber security. We have a world of information, convenience, and entertainment at our fingertips, and yet, in that world, there are dangers and possibilities to have valuable information stolen. In Alex Roger’s time.com article,
6
The IT Professional vs. The Deadly Data Breach
Mon, Sep 15th 2014 8:12a   Liana Lichtenwalner
The Deadly Data Breach We know it well, the Deadly Data Breach! So many people have felt the effects of a data breach, and so many companies are scrambling to protect the personal information they have on file. I am sure data breaches are on the minds of every IT professional that has kept up with the most recent breaches. No one goes unscathed by The Deadly Breach: P.F. Changs, Goodwill, Home Depot, and numerous schools. Home Depot’s recent data breach reaches all the way back to April first
14
You Have a Case of Identity Theft!
Mon, Aug 25th 2014 10:11a   Liana Lichtenwalner
It’s the hot topic in the news, blogs, books, and more, identity theft and security! We are all susceptible to identity theft from the individual user to the largest corporation. Author Steve Weisman has been speaking on Identity Security for years, including his blog Scamicide and in his books The Truth About Avoiding Scams and Identity Theft Alert: 10 Rules You Must Follow. The most recent breach, the Community Heath System, is one that Weisman covers in his blog entry Community Health Sys




Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition