Cyber Authentication – Google Weak on Password Management Systems

Cyber Authentication – Google Weak on Password Management Systems

When it comes to cyber authentication, the weakest link is the user. Cyber authentication is a hot topic in today’s world of Malware, Cyber Warfare, BYOD, Cloud Computing and Hackers. In a recent Google Password Management blog, “Google Password...
Dovell’s Three Laws of Computers

Dovell’s Three Laws of Computers

Network Access Authentication is essential to the Laws of Computers The concept of mechanical devices that will do manual and menial labor can be traced back to Ancient Greece. Whether it’s an automaton by Hephaestus or Honda’s Asimo robot, they all have...
Exporting Power LogOn

Exporting Power LogOn

Access Smart received their ECCN classification determination number today from the US Dept. of Commerce. We are classified as a 5D992b Information Security Software product which allows Access Smart to ship our Power LogOn software and licenses internationally....
Ingersoll Rand Partners with Access Smart for Cyber Security

Ingersoll Rand Partners with Access Smart for Cyber Security

Ingersoll Rand Security Technologies / Access Smart Provide Cyber Security with Smart Cards Affordable, smartcard based, enterprise password manager for Windows solution for network access authentication CARMEL, Ind – Sept. 6, 2012 – Ingersoll Rand...
Employees Are Not Evil…

Employees Are Not Evil…

They Are Just Drawn That Way Paraphrasing a line from Jessica Rabbit from the movie Roger Rabbit seems the appropriate comment from Geoffrey A. Fowler’s article “What’s a Company’s Biggest Security Risk? You.” Hence the headline:...