Access Review

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
3,951
Score:
5

Add this to the filter section of the Web.xml to enable HSTS.

May 4, 2017
5:08 pm
Reads:
11,396
Score:
5

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
3,436
Score:
5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
2,520
Score:
Unrated

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
1,862
Score:
Unrated

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Sep 8, 2016
1:34 pm
Reads:
2,174
Score:
5

To gain a higher ROI for identity governance, your organization must focus less on maintaining compliance and more on reducing the risk of data breaches.

Travis Greene
Jul 18, 2016
11:41 am
Reads:
2,280
Score:
Unrated

If you’re attending this year’s Gartner IAM Summit, things might be a bit different than what you’re used to. I’ve attended other Gartner events this year, as well as other industry IAM-related events, and the thing I’ve noticed is that IAM is no longer on an island. Where IAM was seen as black magic by…

+ read more

Travis Greene
Nov 20, 2015
4:38 pm
Reads:
2,047
Score:
Unrated

Nobody likes boring. Projects described with words like infrastructure, maintenance, compliance or governance are boring. Anyone that works on these projects does so with much discontentedness. Our neglect of all things boring is becoming an epidemic. Just check out this fantastically entertaining segment from John Oliver’s Last Week Tonight on a few brave auditors “willing…

+ read more

Amie Johnson
Jun 22, 2015
5:57 pm
Reads:
2,987
Score:
5

The idea of driverless cars has fascinated pop culture for many years. From Herbie the Love Bug to KITT from Knight Rider, visions of cars that drive themselves continue to capture our imaginations. Unfortunately, as is the case of driverless cars, we can get ahead of ourselves when trying to develop and use certain technology….

+ read more

Travis Greene
May 26, 2015
3:26 pm
Reads:
2,518
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow