Power LogOn Helps Migrate Companies to PKI Adoption.
In my many blogs, videos and whitepapers, I discuss how passwords are secure, but their management isn’t. Frequently, cybersecurity specialists believe that I’m pitting my Power LogOn solution against a PKI solution. That is not my intent. In reality, Power LogOn is a stepping-stone to PKI adoption.
This is not a contest of one technology being better than another, but rather matching the right technology to the environmental requirements. For example, what’s the difference between a Ferrari and a Jeep? Both are automobiles, they have engines, tires, seats, etc., and both will get you from point A to B on any paved road. However, you would never take your Ferrari off-roading in the Utah desert, nor would you drive a banged-up jeep to the red carpet at the Oscars. Implementation is about matching the correct vehicle to the environmental requirements. IT must also match the correct cyber authentication solution to the company’s requirements. Read More→
My stance on passwords is well known – “Passwords are secure, people managing them aren’t.” Whenever I make this claim, some computer security pundits vehemently disagree with me. They bring up technologies like PKI, digital certificates, and all the advanced hardware technology, encryption algorithms and infrastructure. Their arguments are true, but why is all this advanced security technology needed? Answer: to protect the cryptographic keys. Read More→
Access Smart Announces a New Password Manager for Windows Reseller in Africa
Access Smart® is pleased to announce a new Power LogOn – Password Manager for Windows – reseller in Africa. Pure Access IT, LTD, located in Abuja, Nigeria, is adding password manager for Windows to their extensive line of IT services. The addition of Power LogOn provides Pure Access IT customers with a complete secure network solution.
With data breaches and identity theft at epidemic levels, businesses and government agencies need network access authentication to identify a person prior to them getting past the firewall. Passwords are the most common way people use to log onto a computer, network and internet; but, the way individuals choose, use and manage their passwords makes them vulnerable to attack. Power LogOn delivers a secure means to manage passwords with multi-factor authentication, plus user convenience of never having to remember, type or know their passwords. Power LogOn can also be tied in to Active Directory to keep IT as the central manager of access rights and privileges.
“Secure user authentication should never be a luxury and never a barrier to preventing cyber-attacks,” said Dovell Bonnett, Founder and CEO of Access Smart. “We are so pleased to have Pure Access IT as a strong partner.”
Pure Access IT Ltd is a multi-disciplined information technology integrator that offers IT solutions, training as well as expert implementation of the best technologies for website architecture and design, data access, transactions, Internet Service provision and information security. We work with leading companies to deliver to government and businesses at the highest level of technology, integration, and services. Pure Access is also engaged in the provision of software outsourcing services. Today hundreds of small and medium sized businesses including Government rely on the superior technical expertise of the Pure Access Team to support their Systems, network infrastructures, and to provide the necessary support to keep their businesses running.
“Access Smart adds those additional layers of security, low cost of ownership and user convenience needed to authenticate the user,” said Wasiu Olatundun, CEO of Pure Access IT.
Please contact Access Smart or Pure Access IT for more information.
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by J. Andress and S. Winterfeld
Cyber warfare is real. That’s why each Friday I will post a review on this book: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, and today I am sharing what I am reading in…
Chapter 5: Logical Weapons.
This chapter is chocked full of valuable information. Instead of going through the details of all the tools discussed, I think that startling insight into the defense of these attack tools is more important. I do, however, strongly suggest your read this chapter to get a better perspective on the types and capabilities of the available logical access weapons.
The weapons or tools available to cyber warriors are vast and many are free and open sourced. The non-government and non-military attackers are using common or customized tools. At times the same tools used to investigate an attack are also the same tools used to attack. While many may believe that the government and military warriors have highly specialized tools, the authors suggest that they are using some of the same commercially available tools.