If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…
The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…
If the rate and intensity at which my identity has been stolen in the past three years keeps pace, by 2017, I might as well advertise my personally identifiable information (PII) in blinking neon pink sky-writing and throw Mardi Gras beads from the airplane. First, my grocery store’s loyalty program was breached. Then I was…
Who are you? This is one of the most common, perhaps even mundane, questions that we ask each other every day. Yet the answer is always multi-faceted and it reveals interesting, often critical information. It can raise concern, it can pique interest and it can lead to more questions. Based on the answer to this…
At NetIQ, we spend a lot of time listening to things that are important to our customers and partners. News aggregators and social media mentions and posts are a great way to listen. They show what’s trending right now and is often raw, unvarnished and very real. We consider that kind of feedback vitally important…
If you follow me on Twitter, you probably noticed a heightened volume of Tweets from me during the RSA Conference in San Francisco. It was great catching up with many of you based stateside that I rarely get to see in person. I was also fortunate enough to be allowed to attend sessions and live-Tweeted…
It’s a fact that today’s emerging IT delivery models, such as Cloud, Mobile, BYOD, and Social, are driving immense complexity in your IT infrastructure. At the same time, you are faced with increasing diversity in the types of threats you face daily. A quick scan of the headlines reveals that insider attacks remain unchecked, accidental…