Identity

Gartner predicts that by the year 2020, 26 billion devices will be connected to the Internet. All of these devices will make up the “things” of the oft-discussed Internet of Things (IoT). And the use of these connected devices, which can all communicate with each other, continues to expand. Even industries and communities that we…

+ read more

GeoffWebb
By: GeoffWebb
Jul 30, 2015
7:06 am
Reads:
508
Score:
Unrated

Standing in a long line can be reason enough for most people to avoid doing something, even if it’s something important like voting for government leaders. To increase participation, many are in favor of adopting an online voting platform to make voting easier and more convenient for citizens. After all, even the U.S. Department of…

+ read more

GeoffWebb
By: GeoffWebb
Jul 21, 2015
7:07 am
Reads:
493
Score:
Unrated

I’ve been asked a few times about the purpose of various policysets; for what purpose do we have this one vs. that one? Why Event vs. Command, or Creation vs. Placement? There are reasons for all of them, and if followed properly life can be much simpler than if lumping everything under one policyset and…

+ read more

By: ab
Jul 2, 2015
8:15 am
Reads:
256
Score:
5

“You better start swimming or you’ll sink like a stone for the times they are a-changin’,” Bob Dylan famously sang in 1964. “The Times They Are a-Changin’,” has become one of Dylan’s most recognized and well-loved songs. In fact, Steve Jobs recited the second verse of the song during the 1984 annual Apple shareholder meeting…

+ read more

GeoffWebb
By: GeoffWebb
Jun 25, 2015
7:36 am
Reads:
602
Score:
Unrated

In the world of physical security, officers and guards are trained to set a baseline. This baseline tells them what is normal for the time and place. Sitting quietly and drinking coffee is normal for a coffee shop, while leaping and screaming may be normal for a rock concert. With this baseline, security professionals can…

+ read more

Travis Greene
Mar 17, 2015
7:12 am
Reads:
1,357
Score:
5

Identity defines who you are and what you do. But identity isn’t static—especially when it comes to IT. User identity can change and be manipulated, which introduces significant challenges for IT security teams. Multiple major data breaches made headlines in the past 18 months alone, and unless security teams start to focus on identity, they…

+ read more

David Mount
Feb 11, 2015
4:21 am
Reads:
1,154
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
863
Score:
Unrated

What better place to learn about social access and security than Las Vegas? Throngs of people sit down at a gaming table and never think twice about the layers of security in the building. That’s because the security is transparent – casinos are experts at applying security based on user behavior rather than building walls…

+ read more

Travis Greene
Dec 19, 2014
8:49 am
Reads:
1,240
Score:
5

NetIQ Identity Manager has followed an interesting evolutionary path over time. It started as a simple object and attribute synchronization engine with DirXML 1.0 and more features have been added over time. One of the more interesting enhancements has been the addition of the Roles Based Provisioning Module (RBPM) which is really several things all…

+ read more

geoffc
By: geoffc
Feb 14, 2014
11:48 am
Reads:
1,575
Score:
5

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
1,839
Score:
5