Data Breach

It’s often said that children are born negotiators. They possess a natural ability to try to get what they want though trade-offs, attempting to only do something if they get something in return. It’s less said though that children are born Information Security specialists. Surprising you might think – afterall, as marvellous as the human…

+ read more

David Mount
Jan 21, 2016
2:26 am
Reads:
1,933
Score:
Unrated

A quick scan through your daily email or favorite news site brings news of yet another data breach, inevitably brought on by either a mysterious hacker, organized cyber-criminal group or even a malicious insider. What do all of these identities have in common? In more and more cases, these identities have gained and misused privileged…

+ read more

Renee Bradshaw
Sep 25, 2015
10:36 am
Reads:
3,140
Score:
Unrated

The rise of mobility in the workplace is prompting government agencies to investigate using multi-factor authentication for access to applications while maintaining compliance to Homeland Security Presidential Directive 12 (HSPD 12). Issued in 2004, this directive mandates common identification standards for federal employees and contractors. Among other security measures, HSPD 12 resulted in the use…

+ read more

David Shephard
Jun 11, 2015
7:13 am
Reads:
3,009
Score:
5

Identity defines who you are and what you do. But identity isn’t static—especially when it comes to IT. User identity can change and be manipulated, which introduces significant challenges for IT security teams. Multiple major data breaches made headlines in the past 18 months alone, and unless security teams start to focus on identity, they…

+ read more

David Mount
Feb 11, 2015
4:21 am
Reads:
2,493
Score:
5

It’s impossible to tell with any precision if human error in IT is increasing, or decreasing. However, there is plenty of incidental data in the breach headlines of today to support the fact that human, or insider, error is prevalent – and not going away anytime soon. The Hack Heard Round the World For example,…

+ read more

Renee Bradshaw
Dec 22, 2014
9:41 am
Reads:
4,103
Score:
5

Over three decades ago, the game Pitfall! came out for the Atari game console. In it, you control a character named Pitfall Harry, swinging over pits and crocodiles, avoiding fire, scorpions and many other dangers in the jungle while racing to gather treasure. The world is just as rife with dangers to your mobile enterprise…

+ read more

Travis Greene
Dec 10, 2014
10:15 am
Reads:
2,267
Score:
Unrated

Last week, a major financial institution in the US revealed that over 76 million households and seven million small businesses were compromised. The hackers don’t appear to have gained access to personally identifiable information, there’s no evidence that account information was taken, nor is there evidence of fraud. But it’s impossible not to worry about…

+ read more

Rhonda Holloway
Oct 9, 2014
12:12 pm
Reads:
2,468
Score:
3.67
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow