NetIQ Views is the home of NetIQ thought leadership around industry trends, technology and the promise of identity-powered solutions. If you’re wondering what the challenges of today mean for tomorrow, you’ll find that, and much more, here in NetIQ Views.

Highlights

Subscribe to our newsletter

Latest Posts

It’s a complex world out there. There’s no denying it.  This is especially true in the IT world—where admins are expected to keep systems running smoothly.  However, no matter how you slice it: there’s no way around the true complexity of IT. Physical and virtual machines, networks, operating systems, and applications all have to work…

+ read more

wheaps
By: wheaps
Jul 26, 2016
3:38 pm
Reads:
139
Score:
Unrated

Almost every job includes monotonous—but necessary—tasks that we dread completing. For line of business (LOB) managers, access certification is one of these tasks. Imagine a seemingly endless list or spreadsheet containing lines upon lines of users’ names coupled with their levels of access. In addition to a long list of other responsibilities, LOB managers are…

+ read more

Travis Greene
Jul 26, 2016
2:43 am
Reads:
183
Score:
Unrated

To gain a higher ROI for identity governance, your organization must focus less on maintaining compliance and more on reducing the risk of data breaches.

Travis Greene
Jul 18, 2016
11:41 am
Reads:
578
Score:
Unrated

What does the name “Panama Papers” bring to your mind? Outed tax evaders? Exposed grafters? Money launderers? Or like me, does your mind go straight to the risk and prevention of insider security breaches? For those of you who don’t habitually pore over the financial or security press, the Panama Papers refers to a massive…

+ read more

Travis Greene
Jul 14, 2016
10:14 am
Reads:
212
Score:
Unrated

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
635
Score:
5

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

Travis Greene
May 19, 2016
2:11 pm
Reads:
1,090
Score:
Unrated

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
1,459
Score:
5

Recently, I was asked to participate in a roundtable discussion on Export Compliance, Intrusion Software, Network Surveillance and Cybersecurity in Practice at ACI’s Global Encryption Controls. On first glance, one may wonder what Export Compliance has to do with cybersecurity. If you do, then you have probably missed the recent debate around cybersecurity tools and…

+ read more

Michael Angelo
Mar 18, 2016
12:14 pm
Reads:
2,277
Score:
Unrated

It seems that not even strong 2-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario can be devised to first login to a website and trigger a verification code sent to your phone. The attacker would then continue with a follow-up SMS message asking the user…

+ read more

Mar 1, 2016
2:09 pm
Reads:
1,370
Score:
Unrated