by Dovell Bonnett | May 2, 2012 | Cyber Security, Cyber Warfare, Data Security, Password Authentication, Password Management, Power LogOn, Smartcards
Access Smart Announces a New Password Manager for Windows Reseller in Africa Access Smart® is pleased to announce a new Power LogOn – Password Manager for Windows – reseller in Africa. Pure Access IT, LTD, located in Abuja, Nigeria, is adding password...
by Dovell Bonnett | May 1, 2012 | Cloud Security, Cyber Security, Data Security, Identity Theft, Online Security, Social Networking
Google is gathering your personal and corporate data. Google Inc. (GOOG) motto is, “do no harm.” But who defines what is harmful? Employees recently testified to the U.S. Federal Communications Commission that they didn’t initially know that their...
by Dovell Bonnett | Apr 27, 2012 | Book Reviews, Cyber Security, Cyber Warfare, Data Security, Online Security
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
by Dovell Bonnett | Apr 26, 2012 | Cloud Security, Cyber Security, Data Security, Identity Theft, Online Security, Social Networking
Throwing Privacy Out the Window Source: Lifehacker, by Thorin Klosowski I am an extremely private person. I don’t broadcast my location, I use privacy tools to keep advertisers from tracking me, and almost never give any app access to Facebook. Of course, a lot...
by Dovell Bonnett | Apr 23, 2012 | Cloud Security, Cyber Security, Data Security, Multifactor Authentication,, Online Security, Password Authentication, Password Management, Power LogOn
Network Access Authentication using a Magnetic Stripe Card Access Smart®, LLC expands our network access authentication product line for data security. Power LogOn for MagStripe allows any issued magnetic stripe card to be used to log onto a computer and network....
by Dovell Bonnett | Apr 6, 2012 | Book Reviews, Cloud Security, Data Security, Industrial Espionage
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...