HIPAA Healthcare Data Breach Fines Climb With Enforcement Boost Re-Post By Robert Westervelt, CRN 1:48 PM EST Tue. Jan. 08, 2013 Millions of dollars in fines associated with alleged violations of the Health Insurance Portability and Accountability Act have been doled...
Power LogOn® Enhances Information Security of SAP® Data – Capabilities Study SAP is the market leader in Enterprise Resource Planning (ERP) software solutions that include customer relationship management (CRM), product life management (PLM), supply...
When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password...
Cyber Security begins with Network Access Authentication My first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”. The Pentagon...
Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have...
USB Smart Card Readers for Network Access Authentication are Still Safe. A number of online computer news sites are abuzz about a security team’s prototype malware that hijacks USB smart card readers. It seems that a research team out of Luxembourg has issues a...