profile

False Security

NYTimes: Stolen Data Is Tracked to Hacking at Lockheed http://nyti.ms/iUvWpp

Companies spend billions on security systems, the problem is the use the same security and the same system so those systems become the weak link.   This article is an example of the weakness of centralized security authentication.  A better approach is to use rotating passwords or user specific authentication, for example the year someone is born and the last four digits of their social security number.

No comments:

Post a Comment

/**/