by Binoy KL | Mar 26, 2012 | Passwords, PCI DSS Compliance, Standards & Compliance
Usernames and passwords is still the major method of authenticating users to the systems. It would be difficult to find someone without a user name and password in the workplace. In addition, personal usernames and passwords often come into picture when people access...
by Binoy KL | Dec 28, 2010 | Passwords
The fallout from a hacking attack on Gawker Media Inc. a week ago underscores a basic security risk of living more of our lives online: Using the same username and password for multiple sites is convenient, but costly. After the attack on the publisher of such blogs...
by Binoy KL | Jul 22, 2009 | Application Security, Cloud Security, Security News
The recent incident at the Twitter on the information leakage shall not be considered as a cloud security weakness. Reading through various blogs and the description from Twitter , it looks like the real cause is the weak security practices followed by a Twitter...
by Binoy KL | Nov 17, 2006 | Personal Security
Authentication is nothing but the process of validating the user, ensuring that you are who you say you are. There are different approaches towards authentication. These are broadly classifed into three catagories, something What you know (Passwords, and passphrases)...
Recent Comments