When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password...
Cyber Security begins with Network Access Authentication My first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”. The Pentagon...
Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have...
USB Smart Card Readers for Network Access Authentication are Still Safe. A number of online computer news sites are abuzz about a security team’s prototype malware that hijacks USB smart card readers. It seems that a research team out of Luxembourg has issues a...
Mark Zuckerberg, Did you miss the class discussing “Privacy” at Harvard? As you fill your Facebook account with family. friend and new contacts, it is obvious that Privacy is not a word that Facebook cares about or understands. In some recent articles...
Cyber security is something that people are having to think a lot more about these days than they ever have in the past. For one thing, this kind of danger did not even exist some time ago. Now, it is something that we have to deal with constantly. Anyone from a...