Identity Management

I often participate in IT executive and security specific events and hear a lot about the cloud, BYOD, IoT and the changing IT landscape. The underlying questions of these discussions are how can we secure the enterprise in this new landscape, and how can we deliver access to systems on demand to satisfy the business…

+ read more

Oct 17, 2016
4:50 pm
Reads:
542
Score:
5

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Travis Greene
Aug 25, 2015
8:13 am
Reads:
1,904
Score:
Unrated

IT contractors are like in-laws. They may not be blood relatives, but they’re still considered family. Similarly, contractors aren’t standard, permanent employees, but they still work within your organization, making them a part of the organizational family. Some in-laws are dignified and contribute positively to the family; some in-laws dreadful and make holidays a nightmare….

+ read more

Travis Greene
Apr 7, 2015
7:43 am
Reads:
2,303
Score:
Unrated

Ever since the word “robot” was coined in 1920, writers have had no shortage of science fiction scenarios starring robots to play out on stage, on screen and in writing. Robots have been portrayed in every way imaginable, from workers on an assembly line, to intergalactic droids, to the housekeeper of a world-champion boxer…or playing…

+ read more

GeoffWebb
By: GeoffWebb
Feb 12, 2015
3:38 pm
Reads:
3,585
Score:
5

Having spent the early part of my career as a Naval Officer, I’m sometimes struck by parallels between the mechanical and digital worlds. There was a time when a majority of ships relied on steam to drive turbines for propulsion. Tremendous pressure and power was governed by a very simple device. The centrifugal governor worked…

+ read more

Travis Greene
Jan 20, 2015
9:34 am
Reads:
3,546
Score:
Unrated

It’s impossible to tell with any precision if human error in IT is increasing, or decreasing. However, there is plenty of incidental data in the breach headlines of today to support the fact that human, or insider, error is prevalent – and not going away anytime soon. The Hack Heard Round the World For example,…

+ read more

Renee Bradshaw
Dec 22, 2014
9:41 am
Reads:
3,300
Score:
5

What better place to learn about social access and security than Las Vegas? Throngs of people sit down at a gaming table and never think twice about the layers of security in the building. That’s because the security is transparent – casinos are experts at applying security based on user behavior rather than building walls…

+ read more

Travis Greene
Dec 19, 2014
8:49 am
Reads:
1,988
Score:
5

Over three decades ago, the game Pitfall! came out for the Atari game console. In it, you control a character named Pitfall Harry, swinging over pits and crocodiles, avoiding fire, scorpions and many other dangers in the jungle while racing to gather treasure. The world is just as rife with dangers to your mobile enterprise…

+ read more

Travis Greene
Dec 10, 2014
10:15 am
Reads:
1,854
Score:
Unrated

This month, a year ago, the U.S. Department of Justice charged Edward Snowden with violating the Espionage Act and theft of government property. Whatever you think of Snowden, Chelsea [Bradley] Manning, that IRS employee who took home data on 20,000 co-workers data theft by employees, contractors or those impersonating “trusted” insiders is not uncommon. The…

+ read more

David Shephard
Jun 19, 2014
9:46 am
Reads:
2,985
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow