<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Nothin&#8217; Doing on the Failure of Two Factor</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=406" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=406</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Security Curve Weblog</title>
		<link>http://spiresecurity.com/?p=406&#038;cpage=1#comment-668</link>
		<dc:creator>Security Curve Weblog</dc:creator>
		<pubDate>Tue, 18 Jul 2006 04:40:28 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=406#comment-668</guid>
		<description><![CDATA[&lt;strong&gt;Gettin&#039; spanked over two-factor&lt;/strong&gt;

OK, so I&#039;ve been getting some flak from my post the other day about two-factor authentication and phishing. Pete Lindstrom over at spire gives me the wagging finger on the issue, saying that just because there is one phishing site using two-factor, it ...
]]></description>
		<content:encoded><![CDATA[<p><strong>Gettin&#8217; spanked over two-factor</strong></p>
<p>OK, so I&#8217;ve been getting some flak from my post the other day about two-factor authentication and phishing. Pete Lindstrom over at spire gives me the wagging finger on the issue, saying that just because there is one phishing site using two-factor, it &#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Security Curve Weblog</title>
		<link>http://spiresecurity.com/?p=406&#038;cpage=1#comment-669</link>
		<dc:creator>Security Curve Weblog</dc:creator>
		<pubDate>Tue, 18 Jul 2006 00:48:28 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=406#comment-669</guid>
		<description><![CDATA[&lt;strong&gt;Gettin&#039; spanked over two-factor&lt;/strong&gt;

OK, so I&#039;ve been getting some flak from my post the other day about two-factor authentication and phishing. Pete Lindstrom over at spire gives me the wagging finger on the issue, saying that just because there is one phishing site using two-factor, it ...
]]></description>
		<content:encoded><![CDATA[<p><strong>Gettin&#8217; spanked over two-factor</strong></p>
<p>OK, so I&#8217;ve been getting some flak from my post the other day about two-factor authentication and phishing. Pete Lindstrom over at spire gives me the wagging finger on the issue, saying that just because there is one phishing site using two-factor, it &#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alex Hutton</title>
		<link>http://spiresecurity.com/?p=406&#038;cpage=1#comment-667</link>
		<dc:creator>Alex Hutton</dc:creator>
		<pubDate>Mon, 17 Jul 2006 21:08:26 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=406#comment-667</guid>
		<description><![CDATA[No, I was thinking $10 was too high!  I can guarantee large banks aren&#039;t paying tens of millions of dollars for a second factor.

There&#039;s no way tokens fly.  And it&#039;s not just the start up costs, how would you like to be the customer service manager in charge of 1.5 million token users?   And then there&#039;s effectiveness.  Against mass phishing attacks, they&#039;re not going to reduce risk significantly  more than much, much cheaper alternative forms of multi-factor auth.

My suggestion?  Cyota and a question/answer addition to the website.


]]></description>
		<content:encoded><![CDATA[<p>No, I was thinking $10 was too high!  I can guarantee large banks aren&#8217;t paying tens of millions of dollars for a second factor.</p>
<p>There&#8217;s no way tokens fly.  And it&#8217;s not just the start up costs, how would you like to be the customer service manager in charge of 1.5 million token users?   And then there&#8217;s effectiveness.  Against mass phishing attacks, they&#8217;re not going to reduce risk significantly  more than much, much cheaper alternative forms of multi-factor auth.</p>
<p>My suggestion?  Cyota and a question/answer addition to the website.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ryan Russell</title>
		<link>http://spiresecurity.com/?p=406&#038;cpage=1#comment-666</link>
		<dc:creator>Ryan Russell</dc:creator>
		<pubDate>Mon, 17 Jul 2006 17:14:59 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=406#comment-666</guid>
		<description><![CDATA[You think $10 is too low?  I was assuming that banks do enough quantity that they could get a good price break.  So, what I had in mind was a hadware token, with all the software, infrastructure, and personnel behind the scenes to run it.

The gist of the question is the bank has decided they need to implement some technological measure to combat phishing.  If their budget is around $10/customer, should that best be implemented with two-factor authentication, or something else?
]]></description>
		<content:encoded><![CDATA[<p>You think $10 is too low?  I was assuming that banks do enough quantity that they could get a good price break.  So, what I had in mind was a hadware token, with all the software, infrastructure, and personnel behind the scenes to run it.</p>
<p>The gist of the question is the bank has decided they need to implement some technological measure to combat phishing.  If their budget is around $10/customer, should that best be implemented with two-factor authentication, or something else?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Security Incite: Analysis on Information Security</title>
		<link>http://spiresecurity.com/?p=406&#038;cpage=1#comment-670</link>
		<dc:creator>Security Incite: Analysis on Information Security</dc:creator>
		<pubDate>Mon, 17 Jul 2006 14:14:06 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=406#comment-670</guid>
		<description><![CDATA[&lt;strong&gt;The Daily Incite - July 17, 2006&lt;/strong&gt;

July 17, 2006  Good Morning:  Hope you enjoyed your weekend. Mine was a blur of activity, but it always seems that way. I made some changes to the format of TDI, adding Technorati tags for each snippet and also a direct link. I know a lot of folks link
]]></description>
		<content:encoded><![CDATA[<p><strong>The Daily Incite &#8211; July 17, 2006</strong></p>
<p>July 17, 2006  Good Morning:  Hope you enjoyed your weekend. Mine was a blur of activity, but it always seems that way. I made some changes to the format of TDI, adding Technorati tags for each snippet and also a direct link. I know a lot of folks link</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alex Hutton</title>
		<link>http://spiresecurity.com/?p=406&#038;cpage=1#comment-665</link>
		<dc:creator>Alex Hutton</dc:creator>
		<pubDate>Mon, 17 Jul 2006 11:55:36 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=406#comment-665</guid>
		<description><![CDATA[GREAT article.  We have a tendency not to consider cause/effect and the consequences of our actions.  To call the push for two-factor a &quot;failure&quot; is, at best, disingenuous.

Ryan,

$10 per customer!   That&#039;s insane.  Is that for a web service or a Cyota device or what?  In order to make a recommendation I&#039;d need to know Threat Event and Loss Event frequency for phishing attacks for the bank.  You&#039;d also want to  understand culture at the bank.  Some banks see two-factor as more a marketing issue than a security control (they don&#039;t get many phishing attacks at all, but implementing two-factor is a tacit expression of their otherwise very good security controls framework), some see it as a compliance issue, and some really want to do what&#039;s right for the client.  Finally, I&#039;d need to know what their average one-time and annual phishing losses are.

If you want to be purely economic, if the lifetime cost of the control is greater than the loss expectancies during that timespan, then why put in the control (unless, of course, it&#039;s a marketing gimmick)?


]]></description>
		<content:encoded><![CDATA[<p>GREAT article.  We have a tendency not to consider cause/effect and the consequences of our actions.  To call the push for two-factor a &#8220;failure&#8221; is, at best, disingenuous.</p>
<p>Ryan,</p>
<p>$10 per customer!   That&#8217;s insane.  Is that for a web service or a Cyota device or what?  In order to make a recommendation I&#8217;d need to know Threat Event and Loss Event frequency for phishing attacks for the bank.  You&#8217;d also want to  understand culture at the bank.  Some banks see two-factor as more a marketing issue than a security control (they don&#8217;t get many phishing attacks at all, but implementing two-factor is a tacit expression of their otherwise very good security controls framework), some see it as a compliance issue, and some really want to do what&#8217;s right for the client.  Finally, I&#8217;d need to know what their average one-time and annual phishing losses are.</p>
<p>If you want to be purely economic, if the lifetime cost of the control is greater than the loss expectancies during that timespan, then why put in the control (unless, of course, it&#8217;s a marketing gimmick)?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ryan Russell</title>
		<link>http://spiresecurity.com/?p=406&#038;cpage=1#comment-664</link>
		<dc:creator>Ryan Russell</dc:creator>
		<pubDate>Mon, 17 Jul 2006 00:30:47 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=406#comment-664</guid>
		<description><![CDATA[So, a bank that currently doesn&#039;t have any two-factor authentication in place now... that would need to spend around $10 per customer to implement it... should they do so?
]]></description>
		<content:encoded><![CDATA[<p>So, a bank that currently doesn&#8217;t have any two-factor authentication in place now&#8230; that would need to spend around $10 per customer to implement it&#8230; should they do so?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Robert E. Lee</title>
		<link>http://spiresecurity.com/?p=406&#038;cpage=1#comment-663</link>
		<dc:creator>Robert E. Lee</dc:creator>
		<pubDate>Sun, 16 Jul 2006 17:36:11 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=406#comment-663</guid>
		<description><![CDATA[I would prefer to see client certificate based authentication.  If users do not type in credentials when they visit important websites (banks, credit cards, etc), there would be nothing to phish.

Robert
]]></description>
		<content:encoded><![CDATA[<p>I would prefer to see client certificate based authentication.  If users do not type in credentials when they visit important websites (banks, credit cards, etc), there would be nothing to phish.</p>
<p>Robert</p>
]]></content:encoded>
	</item>
</channel>
</rss>
