NetIQ Identity-Powered Security

Identity-Powered Security

If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…

+ read more

Kent Purdy
May 7, 2017
10:51 pm
Reads:
254
Score:
Unrated

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
1,640
Score:
5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
1,251
Score:
Unrated

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
709
Score:
Unrated

I don’t know about you, but every few months someone steals my credit card number, and I end up with a new card. It is no longer a question of if someone can get my personal information, but when. We all go to work every day to provide for our families. And in the blink…

+ read more

Kevin Hughes
Nov 4, 2016
8:30 am
Reads:
1,095
Score:
5

I often participate in IT executive and security specific events and hear a lot about the cloud, BYOD, IoT and the changing IT landscape. The underlying questions of these discussions are how can we secure the enterprise in this new landscape, and how can we deliver access to systems on demand to satisfy the business…

+ read more

Oct 17, 2016
4:50 pm
Reads:
1,436
Score:
5

Are you a proactive or reactive person? Do you foresee the consequences of circumstances or events and plan accordingly? Or do you wait for consequences to occur and then react? We probably all have behaved proactively and reactively at least once in our lives. For the most part, it’s better to be proactive (even if…

+ read more

Jeremy Gobert
Oct 3, 2016
1:00 pm
Reads:
1,102
Score:
4.67

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

Travis Greene
May 19, 2016
2:11 pm
Reads:
3,913
Score:
Unrated

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
4,222
Score:
5