Access Review

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
375
Score:
Unrated

Add this to the filter section of the Web.xml to enable HSTS.

May 4, 2017
5:08 pm
Reads:
324
Score:
Unrated

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
1,640
Score:
5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
1,251
Score:
Unrated

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
709
Score:
Unrated

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Sep 8, 2016
1:34 pm
Reads:
1,276
Score:
5

To gain a higher ROI for identity governance, your organization must focus less on maintaining compliance and more on reducing the risk of data breaches.

Travis Greene
Jul 18, 2016
11:41 am
Reads:
1,444
Score:
Unrated

If you’re attending this year’s Gartner IAM Summit, things might be a bit different than what you’re used to. I’ve attended other Gartner events this year, as well as other industry IAM-related events, and the thing I’ve noticed is that IAM is no longer on an island. Where IAM was seen as black magic by…

+ read more

Travis Greene
Nov 20, 2015
4:38 pm
Reads:
1,142
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow