Privileged User Manager

In the world of physical security, officers and guards are trained to set a baseline. This baseline tells them what is normal for the time and place. Sitting quietly and drinking coffee is normal for a coffee shop, while leaping and screaming may be normal for a rock concert. With this baseline, security professionals can…

+ read more

Travis Greene
Mar 17, 2015
7:12 am
Reads:
579
Score:
5

No organization is immune from a data breach.  The fact is, your organization probably already has been breached.  A new survey from the CyberEdge Group and NetIQ shows you just where IT teams are finding the security vulnerabilities that can lead to breaches and audit findings.  The good news is it’s not hard to find…

+ read more

Renee Bradshaw
Mar 11, 2015
6:05 am
Reads:
577
Score:
Unrated

At a recent speaking engagement, I shared the successful results of our most recent Common Criteria certification efforts. After being congratulated by a member of the audience, we proceeded to have the following discussion: Audience member: “When are you going to be done with SP800-53 certification?” Me: “Huh? Which part of it?” Audience member: “All…

+ read more

michaelfangelo
Jan 8, 2015
9:33 am
Reads:
1,149
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
487
Score:
Unrated

As I listen to IT folks express their concerns about the risk posed by today’s tablets and smart phones, it seems to me that some of them  are in denial about how secure their environments were before them. In the early years of the digital age, once users moved from terminals to distributed desktops, IT’s…

+ read more

Kent Purdy
Jun 25, 2014
5:06 pm
Reads:
962
Score:
Unrated

It’s a fact that today’s emerging IT delivery models, such as Cloud, Mobile, BYOD, and Social, are driving immense complexity in your IT infrastructure.  At the same time, you are faced with increasing diversity in the types of threats you face daily.  A quick scan of the headlines reveals that insider attacks remain unchecked, accidental…

+ read more

Renee Bradshaw
Feb 24, 2014
8:59 am
Reads:
1,124
Score:
Unrated

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
1,534
Score:
5