NetIQ Views is the home of NetIQ thought leadership around industry trends, technology and the promise of identity-powered solutions. If you’re wondering what the challenges of today mean for tomorrow, you’ll find that, and much more, here in NetIQ Views.

Highlights

Subscribe to our newsletter

Latest Posts

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

Travis Greene
May 19, 2016
2:11 pm
Reads:
415
Score:
Unrated

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
811
Score:
Unrated

Recently, I was asked to participate in a roundtable discussion on Export Compliance, Intrusion Software, Network Surveillance and Cybersecurity in Practice at ACI’s Global Encryption Controls. On first glance, one may wonder what Export Compliance has to do with cybersecurity. If you do, then you have probably missed the recent debate around cybersecurity tools and…

+ read more

Michael Angelo
Mar 18, 2016
12:14 pm
Reads:
944
Score:
Unrated

It seems that not even strong 2-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario can be devised to first login to a website and trigger a verification code sent to your phone. The attacker would then continue with a follow-up SMS message asking the user…

+ read more

Mar 1, 2016
2:09 pm
Reads:
855
Score:
Unrated

On February 9, President Obama published “Protecting U.S. Innovation from Cyberthreats” in The Wall Street Journal. The article outlined the cyber-focused portion of the federal budget proposal, which includes a new national plan giving $3 billion to kick-start an overhaul of the federal computer systems. According to the article, Obama’s new Cybersecurity National Action Plan…

+ read more

Michael Angelo
Feb 24, 2016
8:17 am
Reads:
1,043
Score:
Unrated

Like most people, I understand reams of data best with graphics – pictorial images of what the data represents. So, rather than read through pages and pages of numbers, I can look at a graph to understand the trend the data represents. Another way to say this is – a picture is worth a thousand…

+ read more

Feb 3, 2016
2:01 pm
Reads:
1,184
Score:
5

It’s often said that children are born negotiators. They possess a natural ability to try to get what they want though trade-offs, attempting to only do something if they get something in return. It’s less said though that children are born Information Security specialists. Surprising you might think – afterall, as marvellous as the human…

+ read more

David Mount
Jan 21, 2016
2:26 am
Reads:
906
Score:
Unrated

Are you an AppManager 7 or 8 customer? Are you weighing the benefits of upgrading to Appmanager 9 against the work involved in actually performing the upgrade? Well read on, and we’ll talk about three different upgrade options and which one is right for you. In-Place Upgrade With an in-place upgrade simply upgrade the actual…

+ read more

Mike Robinson
Jan 20, 2016
7:56 am
Reads:
997
Score:
Unrated

For some companies, scalability in the IT world means adding more and more hardware. Data centers of giants like Facebook, Amazon, and Google use what Gartner calls web-scale IT architecture, while others simply invest in more truckloads of traditional IT infrastructure. But with AppManager 9 we took a different approach to scalability. In my last…

+ read more

Mike Robinson
Dec 16, 2015
8:46 am
Reads:
1,083
Score:
Unrated