Tag Archives: authentication

Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

  Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO), Two Factor Authentication | Tagged , , , , , , , , | Leave a comment

Or…How a security expert can fall for a phishing scheme Think no one will target your business with phishing attacks?  Think again… This confession is a bit hard for me. Just recently I was the target of a phishing attack.  … Continue reading

Posted in Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Social Engineering | Tagged , , , , , , , , , , , , | Leave a comment

The new IBM i 7.2 release brings several security-related enhancements. Two of them are the ability to use SSO from an IBM i green screen to a remote Telnet or FTP server that also supports Kerberos.

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , | Leave a comment

In a recent post I noted that the Target breach once again raised the idea of biometric authentication as means of improving the protection of corporate data. Yet for all of its benefits, adoption of biometric authentication within the IT … Continue reading

Posted in Biometrics, Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , , , , , , , , | 1 Comment

You’ll notice that the title of this post is “Biometrics And SSO”; not Biometrics for SSO. This is an important distinction. Most IT shops don’t realize that they can use standard SSO along with biometric authentication to implement unobtrusive two-factor … Continue reading

Posted in Biometrics, Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Single Sign-On (SSO) | Tagged , , , | 1 Comment

In the last week or so it has come to light that the way the Target Corporation attackers got into Target’s internal network was by using a vendor’s userID and password. The attackers first compromised the vendor’s corporate network. From … Continue reading

Posted in Biometrics, Botz Blog, Information Security | Tagged , , , , | 3 Comments

I find this authentication mechanism for accessing Web sites and which was proposed in October 2013 very interesting.  The main reasons it’s interesting are that it would be so much easier to register at Web sites, authentication is based on … Continue reading

Posted in Botz Blog, Encryption, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , | Leave a comment

 Many customers download or update data to/from IBM i using XCEL spreadsheets.  When they start using Kerberos authentication, end users won’t want to sign-on when they access data through XCEL.

Posted in Botz Blog, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

An interesting article in Marsha Hofmann in Wired claims that while the 5th amendment protects your right to not reveal a password, it doesn’t protect your right not to provide your fingerprint.

Posted in Biometrics, Botz Blog, Info Security Mgmt, Information Security, Single Sign-On (SSO) | Tagged , , , | Leave a comment