Access Governance

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
1,340
Score:
Unrated

To gain a higher ROI for identity governance, your organization must focus less on maintaining compliance and more on reducing the risk of data breaches.

Travis Greene
Jul 18, 2016
11:41 am
Reads:
1,819
Score:
Unrated

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
5,832
Score:
5

Nobody likes boring. Projects described with words like infrastructure, maintenance, compliance or governance are boring. Anyone that works on these projects does so with much discontentedness. Our neglect of all things boring is becoming an epidemic. Just check out this fantastically entertaining segment from John Oliver’s Last Week Tonight on a few brave auditors “willing…

+ read more

Amie Johnson
Jun 22, 2015
5:57 pm
Reads:
2,458
Score:
5

The idea of driverless cars has fascinated pop culture for many years. From Herbie the Love Bug to KITT from Knight Rider, visions of cars that drive themselves continue to capture our imaginations. Unfortunately, as is the case of driverless cars, we can get ahead of ourselves when trying to develop and use certain technology….

+ read more

Travis Greene
May 26, 2015
3:26 pm
Reads:
2,147
Score:
Unrated

The 2014 Global Economic Crime Survey conducted by PwC shares a startling statistic about cyberattacks: “seven percent of U.S. organizations lost $1 million or more due to cybercrime incidents in 2013, compared with three percent of global organizations; furthermore, 19 percent of U.S. entities reported financial losses of $50,000 to $1 million, compared with eight…

+ read more

Travis Greene
May 21, 2015
10:04 am
Reads:
2,438
Score:
Unrated

How is managing user access to IT resources like managing customer access to movies at a megaplex theater? Both megaplex managers and IT managers must weigh the cost of enforcing access rules. Megaplex rules generally prohibit theater hopping, the practice of paying to see one movie, then sampling other movies in the megaplex for free….

+ read more

Travis Greene
Apr 16, 2015
7:27 am
Reads:
2,255
Score:
Unrated

IT contractors are like in-laws. They may not be blood relatives, but they’re still considered family. Similarly, contractors aren’t standard, permanent employees, but they still work within your organization, making them a part of the organizational family. Some in-laws are dignified and contribute positively to the family; some in-laws dreadful and make holidays a nightmare….

+ read more

Travis Greene
Apr 7, 2015
7:43 am
Reads:
3,061
Score:
Unrated

How can you tell? Many IT professionals can’t tell if their identity and access management (IAM) is keeping pace with the latest regulatory controls. But there are organizations, like the SANS Institute, that have tried to simplify security control models with their Critical Security Controls. Your organization is ultimately responsible for deciding whether or not…

+ read more

Travis Greene
Dec 8, 2014
10:55 am
Reads:
2,792
Score:
5

I have to explain Identity & Access Management (IAM) basics to people at lot. So, I created this animated GIF to help explain it to someone who knows nothing about what comes second nature to those of us in the security game: A person uses any one of these devices: Desktop, laptop, tablet, phone, etc….

+ read more

ianyip
By: ianyip
Jul 12, 2013
7:44 am
Reads:
2,847
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow