Access Control

Having spent the early part of my career as a Naval Officer, I’m sometimes struck by parallels between the mechanical and digital worlds. There was a time when a majority of ships relied on steam to drive turbines for propulsion. Tremendous pressure and power was governed by a very simple device. The centrifugal governor worked…

+ read more

Travis Greene
Jan 20, 2015
9:34 am
Reads:
2,640
Score:
Unrated

At a recent speaking engagement, I shared the successful results of our most recent Common Criteria certification efforts. After being congratulated by a member of the audience, we proceeded to have the following discussion: Audience member: “When are you going to be done with SP800-53 certification?” Me: “Huh? Which part of it?” Audience member: “All…

+ read more

michaelfangelo
Jan 8, 2015
9:33 am
Reads:
2,790
Score:
5

The main objective of this article is to give a step by step procedure for customers to help them to configure the policies for disabled LDAP user to execute usrun command using NPUM.

ashishmrt
By: ashishmrt
Jan 7, 2014
2:54 pm
Reads:
1,661
Score:
Unrated

It seems like the number of companies embracing bring-your-own-device (BYOD) policies is growing every day, with some countries seeing double digit percent growth in the number of mobile devices each year . Some people estimate  that the amount of active mobile devices (including cellular phones) will exceed the population of the earth by 2014. But…

+ read more

David Shephard
Nov 6, 2013
8:25 am
Reads:
2,050
Score:
Unrated

This article explains how to retrieve, manipulate, and send data in a SAML assertion that is not available from the configured user store in a SAML assertion – “external data”.

pmckeith
By: pmckeith
Sep 17, 2013
1:00 pm
Reads:
3,978
Score:
5

Mobility and access from anywhere, anytime and any device continues to be a challenge for many organizations. Organizations require the flexibility of access and IT must maintain security without imposing undue inconvenience on the user, whether they be corporate employees, field employees, contractors, suppliers, customers, etc. Each role requires access to services with varying degrees…

+ read more

Aug 14, 2013
1:52 pm
Reads:
1,831
Score:
Unrated

In PUM, the Audit feature uses a store and forward mechanism, so when it connects to the agent machine, audit logs will be stored on the agent machine and forwarded to the manager. But this leads to the concern where the service could be stopped or mishandled on the agent machine. In that case audit…

+ read more

ashishmrt
By: ashishmrt
Jul 18, 2013
4:42 pm
Reads:
2,406
Score:
Unrated

Jumping straight in: 1. Security by Design Designing a new infrastructure or system is a process that’s often dominated by the technical specifications, and to large extent, rightly so. However, specifications, stated in terms of speeds and feeds, rarely describe the whole story. They often assume that security is a given, mentions of which are…

+ read more

David Shephard
Jul 11, 2013
8:44 am
Reads:
1,802
Score:
Unrated

I’ll admit it. I’m a sci-fi geek. If a story or movie has flying saucers, aliens, or space battles-I’ve probably read it or seen it. I remember being particularly spooked by the classic 1951 film The Thing from Another  World based on a 1938 short story “Who Goes There?” What I didn’t guess was that…

+ read more

wheaps
By: wheaps
Dec 11, 2012
11:26 am
Reads:
2,126
Score:
Unrated

If you’re in IT, there’s a good chance that you’re expending a lot of time and money on the latest, high-end firewalls to keep information in and intruders out. An ironic reality to that fact is that at the same time your business is transitioning their applications out to the cloud. Adding to this firewall…

+ read more

Kent Purdy
Nov 16, 2012
5:54 pm
Reads:
1,693
Score:
Unrated