NetIQ Identity-Powered Security

Identity-Powered Security

If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…

+ read more

Kent Purdy
May 7, 2017
10:51 pm
Reads:
1,766
Score:
Unrated

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
2,342
Score:
5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
1,929
Score:
Unrated

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
1,275
Score:
Unrated

I don’t know about you, but every few months someone steals my credit card number, and I end up with a new card. It is no longer a question of if someone can get my personal information, but when. We all go to work every day to provide for our families. And in the blink…

+ read more

Kevin Hughes
Nov 4, 2016
8:30 am
Reads:
1,494
Score:
5

I often participate in IT executive and security specific events and hear a lot about the cloud, BYOD, IoT and the changing IT landscape. The underlying questions of these discussions are how can we secure the enterprise in this new landscape, and how can we deliver access to systems on demand to satisfy the business…

+ read more

Oct 17, 2016
4:50 pm
Reads:
1,807
Score:
5

Are you a proactive or reactive person? Do you foresee the consequences of circumstances or events and plan accordingly? Or do you wait for consequences to occur and then react? We probably all have behaved proactively and reactively at least once in our lives. For the most part, it’s better to be proactive (even if…

+ read more

Jeremy Gobert
Oct 3, 2016
1:00 pm
Reads:
1,617
Score:
4.67