Data Security

“You better start swimming or you’ll sink like a stone for the times they are a-changin’,” Bob Dylan famously sang in 1964. “The Times They Are a-Changin’,” has become one of Dylan’s most recognized and well-loved songs. In fact, Steve Jobs recited the second verse of the song during the 1984 annual Apple shareholder meeting…

+ read more

GeoffWebb
By: GeoffWebb
Jun 25, 2015
7:36 am
Reads:
2,509
Score:
Unrated

Having spent the early part of my career as a Naval Officer, I’m sometimes struck by parallels between the mechanical and digital worlds. There was a time when a majority of ships relied on steam to drive turbines for propulsion. Tremendous pressure and power was governed by a very simple device. The centrifugal governor worked…

+ read more

Travis Greene
Jan 20, 2015
9:34 am
Reads:
4,440
Score:
Unrated

With the onset of a new year, it is prediction season again, and several NetIQ thought leaders have shared their identity, security and cloud insights. The emerging trends that have arisen in prior years like cloud, mobility, social and big data have been key challenges recently that are reflected in this year’s predictions. According to…

+ read more

David Shephard
Jan 17, 2014
9:27 am
Reads:
3,753
Score:
5

It’s prediction season again and I’ve written a piece for CSO Australia. Here’s how it starts…    “2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that appeared on the radar in 2012…

+ read more

ianyip
By: ianyip
Dec 20, 2013
9:39 am
Reads:
5,186
Score:
Unrated

It seems like the number of companies embracing bring-your-own-device (BYOD) policies is growing every day, with some countries seeing double digit percent growth in the number of mobile devices each year . Some people estimate  that the amount of active mobile devices (including cellular phones) will exceed the population of the earth by 2014. But…

+ read more

David Shephard
Nov 6, 2013
8:25 am
Reads:
3,086
Score:
Unrated

This is the last in a series of 5 blogs that address the results of a cloud security survey conducted on NetIQ’s behalf earlier this year. The purpose of the survey was to understand the perceptions of cloud security within enterprises worldwide. In this last installment, I take a look at how well IT managers…

+ read more

Renee Bradshaw
Sep 5, 2013
10:54 am
Reads:
2,626
Score:
Unrated

This is part 4 of a 5-part blog series discussing the results of a recent industry survey we conducted to understand the perceptions of cloud security within enterprises worldwide. Today, I’ll take a look at how confident IT managers are in their ability to demonstrate regulatory compliance of sensitive data in the cloud. Globally, most…

+ read more

Renee Bradshaw
Sep 4, 2013
9:12 am
Reads:
2,693
Score:
Unrated

While there are benefits to the importing of user-owned devices into the enterprise, the organisation needs to be very aware of the risks associated with allowing them to be connected to the corporate network. Many of these risks are widely publicised and well known. They include: the possibility of introducing malware into the enterprise via…

+ read more

David Shephard
Jul 16, 2013
8:58 am
Reads:
2,438
Score:
Unrated

According to a recent survey, if you are a security professional counting on a Security Information and Event Management (SIEM) solution to protect your critical assets from nefarious hackers, state-sponsored exploits or the inadvertent missteps of an eager new employee, you may not be as enthusiastic as you once were about your SIEM.  Just look…

+ read more

Renee Bradshaw
Apr 9, 2013
8:22 am
Reads:
2,664
Score:
Unrated

2013 Prediction: Threat detection and management will be required to monitor continuously and in business context with regard to level of risk. Given the rapid change, information requirements, environment complexity, growing devices, explosive data growth and growing real-time analysis requirements accessing that data, risk of threats to the organization is growing exponentially. It will no…

+ read more

Nov 20, 2012
9:02 am
Reads:
3,978
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow