by Dovell Bonnett | Jun 6, 2012 | Cloud Security, Cyber Security, Data Security, Identity Theft, Multifactor Authentication,, Online Security, Password Authentication, Password Management
Simple Security Questions Weaken Passwords Today it was reported that presumptive GOP Presidential candidate Mitt Romney had his personal Hotmail account hacked by someone who figured out Romney’s answer to the “Forgot Password” security question....
by Dovell Bonnett | Jun 3, 2012 | Cloud Security, Cyber Security, Data Security, Online Security
Cloud Computing – A Poem of Warning The SPYder and the Guy By Dovell Bonnett (June 28, 2011) “Welcome to my cloud?” said the SPYder to the Guy, “‘Tis the cheapest little cloud that ever you will try; The way into my cloud is to...
by Dovell Bonnett | Jun 3, 2012 | Cloud Security, Cyber Security, Cyber Warfare, Data Security, Data Theft Prevention, Identity Theft, Industrial Espionage, Multifactor Authentication,, Online Security, Password Authentication, Password Management
Anonymous is helping IT convince management to beef up network security. Organizations like Anonymous takes great pride in breaking into corporate networks they politically disagree with. Recently the Canadian Grand Prix, U.S. Department of Justice and Alpha Unmanned...
by Dovell Bonnett | May 31, 2012 | Data Security, Data Theft Prevention, Identity Theft
Rampant Identity Theft could undermine the right of every citizen to vote. Two separate news stories when combined may have devastating effects on our nation’s sovereignty. The first one discusses how, according to the Identity Theft Resource Center...
by Dovell Bonnett | May 18, 2012 | Book Reviews, Cloud Security, Cyber Security, Cyber Warfare, Data Security, Online Security
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
by Dovell Bonnett | May 4, 2012 | Book Reviews, Cyber Security, Cyber Warfare, Data Security, Industrial Espionage
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...