Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and...
Throwing Privacy Out the Window Source: Lifehacker, by Thorin Klosowski I am an extremely private person. I don’t broadcast my location, I use privacy tools to keep advertisers from tracking me, and almost never give any app access to Facebook. Of course, a lot...
Network Access Authentication using a Magnetic Stripe Card Access Smart®, LLC expands our network access authentication product line for data security. Power LogOn for MagStripe allows any issued magnetic stripe card to be used to log onto a computer and network....
Cyber Attacks and Cyber Distrust Drives Older Technologies. I recently commented in my LinkedIn Smartcard Group to a posting about why The USPS was promoting their “snail mail over email. Some commentors argued that promoting older technologies like the post...
To businesses of all sizes the cloud is the rage. Companies are moving to the cloud for cost savings, convenience for their road warriors, data backup, new applications and a host of other business reasons. What one rarely hears is that companies are moving to the...
HP ProtectTools Hewlett-Packard computer owners have asked about getting a smartcard security logon system as advertised when they bought their HP computer. However, when they call HP Customer Support about the ProtectTools Solution, no information is forthcoming. In...