Why rebadge when you can extend functions? The convergence of physical and logical access on an employee ID badge has been a much discussed topic over the past 10 years. I know, I have been one of its major champions. However, the one stumbling block that has stopped...
The Great Password Question That Won’t Die, “Just how long should a password be?” In one of my LinkedIn discussion groups, a member, who we will call MB, posted this simple question back on March 14, 2010: “How long should a password...
Great information but forgot a key security component. User Authentication. On Wed 26th of October I attended the Information Systems Security Association (ISSA) Security Symposium in Long Beach, California. Different security leaders discussed poignant topics like...
I had a great interview earlier this week with Mari Frank of Privacy Piracy. We discussed solutions to reduce security risks for individual users, small businesses and large corporations. Here is the interview information. Sept 12, Dovell Bonnett, Computer...
With all the cyber attacks reported in the news and with the increase in email SPAM with malware attachments, company CEO’s are asking me about their protection strategies. When I start discussing anti-virus and anti-malware software, I often get the same...
Recently McAffe published a worldwide hacking report about what they are calling Shady RAT. The United Nations, Olympic committees, governments, U.S. real estate company, a major media organization based in New York, a satellite communications company and other...