Microsoft Enterprise Cloud Alliance Now Includes Authenticated Access – Delivered by Power Logon® Ladera Ranch, CA – March 29, 2016 – Access Smart, LLC, a multi-factor authentication cybersecurity provider, today announced that the company...
Security breach exposes roughly 100,000 IEEE members’ User IDs and Passwords On Sept. 24 2012 the Institute of Electrical and Electronics Engineers (IEEE) confirmed that nearly 100,000 of its members User Names and Passwords were publicly exposed from a...
Cyber Crime Protection – Evaluate and Segment Data It only seemed like yesterday that when business owners were asked about network security their focus was on identity theft protection and/or compliance with the different state and federal privacy laws....
Unfortunately,an estimated 45,600 users will not be able to connect to the internet This coming Monday morning may be unusually tough for many Internet users and businesses. A nasty malware called DNSChanger Trojan that infected computers and servers...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld. Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security...
Paraphrasing a line from Jessica Rabbit from the movie Roger Rabbit seems the appropriate comment from Geoffrey A. Fowler’s article “What’s a Company’s Biggest Security Risk? You.” Hence the headline: Employees Are Not Evil –...
Cloud Security – A Poem The SPYder and the Guy By Dovell Bonnett (June 28, 2011) “Welcome to my cloud?” said the SPYder to the Guy, “‘Tis the cheapest little cloud that ever you will try; The way into my cloud is to upload my link...