HIPAA Healthcare Data Breach Fines Climb With Enforcement Boost Re-Post By Robert Westervelt, CRN 1:48 PM EST Tue. Jan. 08, 2013 Millions of dollars in fines associated with alleged violations of the Health Insurance Portability and Accountability Act have been doled...
When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password Management Tips...
Cyber Security begins with Network Access Authentication My first Law of Computers took a step backwards on November 20, 2012 with the announcement of the Pentagon’s new Cyber Warfare Central proposed by DARPA, Code Name “PlanX”. The Pentagon is giving birth to a...
Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have something in...
USB Smart Card Readers for Network Access Authentication are Still Safe. A number of online computer news sites are abuzz about a security team’s prototype malware that hijacks USB smart card readers. It seems that a research team out of Luxembourg has issues a...
Cyber security is something that people are having to think a lot more about these days than they ever have in the past. For one thing, this kind of danger did not even exist some time ago. Now, it is something that we have to deal with constantly. Anyone from a...