Security Web

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
1,097
Score:
5

Add this to the filter section of the Web.xml to enable HSTS.

May 4, 2017
5:08 pm
Reads:
1,923
Score:
5

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
3,315
Score:
5

We’ve all been there. A few times each year IT revisits their shortlist of potential projects to determine what to fund. For many, the list of “to do’s” is longer than their arm, while their budget fits in a shirt pocket. Which inevitably results in prioritizing spend on projects that address risk and compliance first….

+ read more

Kent Purdy
Oct 22, 2014
4:05 pm
Reads:
15,595
Score:
5

Recently, as I was scrolling through one of my social media feeds, I noticed that a friend of mine had copyrighted one of his photos. While visiting a local festival, he took a snapshot of a vendor’s table stacked high with hand-painted pottery and posted it to his social network. The colorful bowls caught my…

+ read more

Rhonda Holloway
Oct 15, 2014
11:33 am
Reads:
2,645
Score:
5

Last week, a major financial institution in the US revealed that over 76 million households and seven million small businesses were compromised. The hackers don’t appear to have gained access to personally identifiable information, there’s no evidence that account information was taken, nor is there evidence of fraud. But it’s impossible not to worry about…

+ read more

Rhonda Holloway
Oct 9, 2014
12:12 pm
Reads:
2,332
Score:
3.67

At NetIQ, we spend a lot of time listening to things that are important to our customers and partners. News aggregators and social media mentions and posts are a great way to listen. They show what’s trending right now and is often raw, unvarnished and very real. We consider that kind of feedback vitally important…

+ read more

Rhonda Holloway
Oct 2, 2014
2:12 am
Reads:
2,894
Score:
5

It has long been said that information is the lifeblood of the organization, and it must be protected. But when your data is flowing freely between myriad unmanaged mobile computing devices and networks—the hurdle for IT Security Pros to keep sensitive information safe just keeps getting higher and higher. Fortunately, NetIQ and Cisco are here…

+ read more

Brennan
By: Brennan
Oct 1, 2014
7:24 am
Reads:
15,621
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow