by Dovell Bonnett | Jun 3, 2012 | Cloud Security, Cyber Security, Data Security, Online Security
Cloud Computing – A Poem of Warning The SPYder and the Guy By Dovell Bonnett (June 28, 2011) “Welcome to my cloud?” said the SPYder to the Guy, “‘Tis the cheapest little cloud that ever you will try; The way into my cloud is to...
by Dovell Bonnett | Jun 3, 2012 | Cloud Security, Cyber Security, Cyber Warfare, Data Security, Data Theft Prevention, Identity Theft, Industrial Espionage, Multifactor Authentication,, Online Security, Password Authentication, Password Management
Anonymous is helping IT convince management to beef up network security. Organizations like Anonymous takes great pride in breaking into corporate networks they politically disagree with. Recently the Canadian Grand Prix, U.S. Department of Justice and Alpha Unmanned...
by Dovell Bonnett | May 18, 2012 | Book Reviews, Cloud Security, Cyber Security, Cyber Warfare, Data Security, Online Security
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
by Dovell Bonnett | May 4, 2012 | Book Reviews, Cyber Security, Cyber Warfare, Data Security, Industrial Espionage
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
by Dovell Bonnett | May 2, 2012 | Cyber Security, Cyber Warfare, Data Security, Password Authentication, Password Management, Power LogOn, Smartcards
Access Smart Announces a New Password Manager for Windows Reseller in Africa Access Smart® is pleased to announce a new Power LogOn – Password Manager for Windows – reseller in Africa. Pure Access IT, LTD, located in Abuja, Nigeria, is adding password...
by Dovell Bonnett | May 1, 2012 | Cloud Security, Cyber Security, Data Security, Identity Theft, Online Security, Social Networking
Google is gathering your personal and corporate data. Google Inc. (GOOG) motto is, “do no harm.” But who defines what is harmful? Employees recently testified to the U.S. Federal Communications Commission that they didn’t initially know that their...