Email flyers and advertisements largely replaced paper flyers, just as online news blogs and sites are largely replacing traditional newspapers. However, email marketing is becoming less effective each passing day because people are so bombarded with spam in their...
A Hewlett-Packard’s white paper “HP ProtectTools: Authentication technologies and suitability to task“, 06/2005, does a very good job discussing the different security technologies available (Passwords, Trusted Platform Module, smartcard USB token,...
In an exclusive survey, members of the CIO Forum on LinkedIn have weighed in on the business impact of application performance. These CIOs and IT leaders say they directly associate application performance with end-user and customer satisfaction, along with the...
A few years ago, many of us had only a few passwords to remember. Today, we have dozens. Corporate networks have become virtually impossible to use today without passwords. On top of this, “IT’s best security practice” requires that employees change...
Passwords are the foundation for computer, network and SaaS (Cloud) authentication. One has to create strong passwords to be the vanguard. The more complex you make your passwords, the safer your data becomes. Unfortunately, complex passwords and a frequent...
Cloud Security – A Poem The SPYder and the Guy By Dovell Bonnett (June 28, 2011) “Welcome to my cloud?” said the SPYder to the Guy, “‘Tis the cheapest little cloud that ever you will try; The way into my cloud is to upload my link...