Identity Management

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Travis Greene
Aug 25, 2015
8:13 am
Reads:
1,458
Score:
Unrated

IT contractors are like in-laws. They may not be blood relatives, but they’re still considered family. Similarly, contractors aren’t standard, permanent employees, but they still work within your organization, making them a part of the organizational family. Some in-laws are dignified and contribute positively to the family; some in-laws dreadful and make holidays a nightmare….

+ read more

Travis Greene
Apr 7, 2015
7:43 am
Reads:
2,100
Score:
Unrated

Ever since the word “robot” was coined in 1920, writers have had no shortage of science fiction scenarios starring robots to play out on stage, on screen and in writing. Robots have been portrayed in every way imaginable, from workers on an assembly line, to intergalactic droids, to the housekeeper of a world-champion boxer…or playing…

+ read more

GeoffWebb
By: GeoffWebb
Feb 12, 2015
3:38 pm
Reads:
3,353
Score:
5

Having spent the early part of my career as a Naval Officer, I’m sometimes struck by parallels between the mechanical and digital worlds. There was a time when a majority of ships relied on steam to drive turbines for propulsion. Tremendous pressure and power was governed by a very simple device. The centrifugal governor worked…

+ read more

Travis Greene
Jan 20, 2015
9:34 am
Reads:
3,337
Score:
Unrated

It’s impossible to tell with any precision if human error in IT is increasing, or decreasing. However, there is plenty of incidental data in the breach headlines of today to support the fact that human, or insider, error is prevalent – and not going away anytime soon. The Hack Heard Round the World For example,…

+ read more

Renee Bradshaw
Dec 22, 2014
9:41 am
Reads:
3,007
Score:
5

What better place to learn about social access and security than Las Vegas? Throngs of people sit down at a gaming table and never think twice about the layers of security in the building. That’s because the security is transparent – casinos are experts at applying security based on user behavior rather than building walls…

+ read more

Travis Greene
Dec 19, 2014
8:49 am
Reads:
1,853
Score:
5

Over three decades ago, the game Pitfall! came out for the Atari game console. In it, you control a character named Pitfall Harry, swinging over pits and crocodiles, avoiding fire, scorpions and many other dangers in the jungle while racing to gather treasure. The world is just as rife with dangers to your mobile enterprise…

+ read more

Travis Greene
Dec 10, 2014
10:15 am
Reads:
1,515
Score:
Unrated

This month, a year ago, the U.S. Department of Justice charged Edward Snowden with violating the Espionage Act and theft of government property. Whatever you think of Snowden, Chelsea [Bradley] Manning, that IRS employee who took home data on 20,000 co-workers data theft by employees, contractors or those impersonating “trusted” insiders is not uncommon. The…

+ read more

David Shephard
Jun 19, 2014
9:46 am
Reads:
2,692
Score:
Unrated

I recently attended an online IDM User Group meeting about the products created by another member of the IDM community; his name is Stefaan Van Cauwenberge and one of his creations is known as the Generic File Driver. This new shim provides the same kind of functionality as the Delimited Text shim from NetIQ, but…

+ read more

By: ab
Apr 7, 2014
11:36 am
Reads:
3,233
Score:
5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow