NetIQ Views is the home of NetIQ thought leadership around industry trends, technology and the promise of identity-powered solutions. If you’re wondering what the challenges of today mean for tomorrow, you’ll find that, and much more, here in NetIQ Views.

Highlights

Subscribe to our newsletter

Latest Posts

Gartner predicts that by the year 2020, 26 billion devices will be connected to the Internet. All of these devices will make up the “things” of the oft-discussed Internet of Things (IoT). And the use of these connected devices, which can all communicate with each other, continues to expand. Even industries and communities that we…

+ read more

GeoffWebb
By: GeoffWebb
Jul 30, 2015
7:06 am
Reads:
441
Score:
Unrated

You probably know Larry Ellison as the founder and current CTO of Oracle. But he’s also passionate about sailing—although “passionate” may be an understatement. Scuttleboat Sailing News reports that Ellison spent an estimated $500 million competing in the 2013 America’s Cup. While this amount of money is way more than most organizations’ annual security budget,…

+ read more

Travis Greene
Jul 28, 2015
7:44 am
Reads:
406
Score:
Unrated

Standing in a long line can be reason enough for most people to avoid doing something, even if it’s something important like voting for government leaders. To increase participation, many are in favor of adopting an online voting platform to make voting easier and more convenient for citizens. After all, even the U.S. Department of…

+ read more

GeoffWebb
By: GeoffWebb
Jul 21, 2015
7:07 am
Reads:
470
Score:
Unrated

Author Thomas Hood once wrote, “…the easiest reading is damned hard writing.” I imagine most system administrators would express a similar sentiment when approached about automating parts of their organization’s identity and access management (IAM) system. Although automation makes IAM processes less complex for users, it introduces additional complexity for IT, particularly in four specific…

+ read more

Travis Greene
Jul 1, 2015
7:13 am
Reads:
665
Score:
Unrated

As organizations respond to the current sea change in the way people work as well as what they use as their office, most organizations still have a ways to go in terms of keeping remote access secure and effective while at the same time reigning in costs. Although most all companies are continuing their shift…

+ read more

Kent Purdy
Jun 25, 2015
4:37 pm
Reads:
582
Score:
Unrated

“You better start swimming or you’ll sink like a stone for the times they are a-changin’,” Bob Dylan famously sang in 1964. “The Times They Are a-Changin’,” has become one of Dylan’s most recognized and well-loved songs. In fact, Steve Jobs recited the second verse of the song during the 1984 annual Apple shareholder meeting…

+ read more

GeoffWebb
By: GeoffWebb
Jun 25, 2015
7:36 am
Reads:
592
Score:
Unrated

This blog post kicks off a series on new challenges that we’ll be facing in coming years related to the Internet of Things (IoT)—which, simply put, means our tendency to attach everything from our cars to our socks to the global internet. This will inevitably lead to two things: you’ll have amazing access to all…

+ read more

DCorlette
By: DCorlette
Jun 23, 2015
7:54 am
Reads:
595
Score:
Unrated

Nobody likes boring. Projects described with words like infrastructure, maintenance, compliance or governance are boring. Anyone that works on these projects does so with much discontentedness. Our neglect of all things boring is becoming an epidemic. Just check out this fantastically entertaining segment from John Oliver’s Last Week Tonight on a few brave auditors “willing…

+ read more

Amie Johnson
Jun 22, 2015
5:57 pm
Reads:
497
Score:
Unrated

Since WikiLeaks recently released thousands of hacked documents from Sony Entertainment Pictures, IT security professionals have been scouring the searchable database of 30,287 documents and 173,132 emails. Besides incriminating celebrity gossip, they found poor password practices that would make even your tech-illiterate grandparents cringe. Security analyst Graham Cluley points out several examples of these practices…

+ read more

GeoffWebb
By: GeoffWebb
Jun 16, 2015
7:33 am
Reads:
670
Score:
Unrated

The rise of mobility in the workplace is prompting government agencies to investigate using multi-factor authentication for access to applications while maintaining compliance to Homeland Security Presidential Directive 12 (HSPD 12). Issued in 2004, this directive mandates common identification standards for federal employees and contractors. Among other security measures, HSPD 12 resulted in the use…

+ read more

David Shephard
Jun 11, 2015
7:13 am
Reads:
363
Score:
5