Security Web

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
1,603
Score:
5

Add this to the filter section of the Web.xml to enable HSTS.

May 4, 2017
5:08 pm
Reads:
3,540
Score:
5

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
3,496
Score:
5

We’ve all been there. A few times each year IT revisits their shortlist of potential projects to determine what to fund. For many, the list of “to do’s” is longer than their arm, while their budget fits in a shirt pocket. Which inevitably results in prioritizing spend on projects that address risk and compliance first….

+ read more

Kent Purdy
Oct 22, 2014
4:05 pm
Reads:
15,706
Score:
5

Recently, as I was scrolling through one of my social media feeds, I noticed that a friend of mine had copyrighted one of his photos. While visiting a local festival, he took a snapshot of a vendor’s table stacked high with hand-painted pottery and posted it to his social network. The colorful bowls caught my…

+ read more

Rhonda Holloway
Oct 15, 2014
11:33 am
Reads:
2,775
Score:
5

Last week, a major financial institution in the US revealed that over 76 million households and seven million small businesses were compromised. The hackers don’t appear to have gained access to personally identifiable information, there’s no evidence that account information was taken, nor is there evidence of fraud. But it’s impossible not to worry about…

+ read more

Rhonda Holloway
Oct 9, 2014
12:12 pm
Reads:
2,472
Score:
3.67

At NetIQ, we spend a lot of time listening to things that are important to our customers and partners. News aggregators and social media mentions and posts are a great way to listen. They show what’s trending right now and is often raw, unvarnished and very real. We consider that kind of feedback vitally important…

+ read more

Rhonda Holloway
Oct 2, 2014
2:12 am
Reads:
3,036
Score:
5

It has long been said that information is the lifeblood of the organization, and it must be protected. But when your data is flowing freely between myriad unmanaged mobile computing devices and networks—the hurdle for IT Security Pros to keep sensitive information safe just keeps getting higher and higher. Fortunately, NetIQ and Cisco are here…

+ read more

Brennan
By: Brennan
Oct 1, 2014
7:24 am
Reads:
15,769
Score:
Unrated

Everyone knows that event auditing and logging are a mess. We’ve known that for years. Seems like every vendor has come up with their own format…if they follow any pattern at all. Many have even (for reasons that entirely befuddle me) come up with proprietary APIs/protocols just to get the data in the first place….

+ read more

David
By: David
Aug 15, 2014
1:14 pm
Reads:
3,613
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow