Cyber Authentication Video with Power LogOn

Cyber authentication starts with Power LogOn. I just produced a new video describing cyber access control and what you get when you purchase our Power LogOn Administrator Starter Kit on Vimeo and YouTube. Please watch it and any feedback or comments are most...
Cyber Authentication – Google Weak on Password Management Systems

Cyber Authentication – Google Weak on Password Management Systems

When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips...
Cyber Warfare Protection Start With Cyber Authentication

Cyber Warfare Protection Start With Cyber Authentication

Cyber Security begins with Network Access Authentication My first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”.  The Pentagon is giving birth to a...
Dovell’s Three Laws of Computers

Dovell’s Three Laws of Computers

Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in...