NetIQ Identity-Powered Security

Identity-Powered Security

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
1,296
Score:
5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
674
Score:
Unrated

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
494
Score:
Unrated

I don’t know about you, but every few months someone steals my credit card number, and I end up with a new card. It is no longer a question of if someone can get my personal information, but when. We all go to work every day to provide for our families. And in the blink…

+ read more

Kevin Hughes
Nov 4, 2016
8:30 am
Reads:
904
Score:
5

I often participate in IT executive and security specific events and hear a lot about the cloud, BYOD, IoT and the changing IT landscape. The underlying questions of these discussions are how can we secure the enterprise in this new landscape, and how can we deliver access to systems on demand to satisfy the business…

+ read more

Oct 17, 2016
4:50 pm
Reads:
1,181
Score:
5

Are you a proactive or reactive person? Do you foresee the consequences of circumstances or events and plan accordingly? Or do you wait for consequences to occur and then react? We probably all have behaved proactively and reactively at least once in our lives. For the most part, it’s better to be proactive (even if…

+ read more

Jeremy Gobert
Oct 3, 2016
1:00 pm
Reads:
857
Score:
4.67

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

Travis Greene
May 19, 2016
2:11 pm
Reads:
3,388
Score:
Unrated

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
3,712
Score:
5

Recently, I was asked to participate in a roundtable discussion on Export Compliance, Intrusion Software, Network Surveillance and Cybersecurity in Practice at ACI’s Global Encryption Controls. On first glance, one may wonder what Export Compliance has to do with cybersecurity. If you do, then you have probably missed the recent debate around cybersecurity tools and…

+ read more

Michael Angelo
Mar 18, 2016
12:14 pm
Reads:
6,658
Score:
Unrated