IT Security

I don’t know about you, but every few months someone steals my credit card number, and I end up with a new card. It is no longer a question of if someone can get my personal information, but when. We all go to work every day to provide for our families. And in the blink…

+ read more

Kevin Hughes
Nov 4, 2016
8:30 am
Reads:
1,559
Score:
5

Are you a proactive or reactive person? Do you foresee the consequences of circumstances or events and plan accordingly? Or do you wait for consequences to occur and then react? We probably all have behaved proactively and reactively at least once in our lives. For the most part, it’s better to be proactive (even if…

+ read more

Jeremy Gobert
Oct 3, 2016
1:00 pm
Reads:
1,692
Score:
4.67

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

Travis Greene
May 19, 2016
2:11 pm
Reads:
5,907
Score:
Unrated

It’s often said that children are born negotiators. They possess a natural ability to try to get what they want though trade-offs, attempting to only do something if they get something in return. It’s less said though that children are born Information Security specialists. Surprising you might think – afterall, as marvellous as the human…

+ read more

David Mount
Jan 21, 2016
2:26 am
Reads:
1,981
Score:
Unrated

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Travis Greene
Aug 25, 2015
8:13 am
Reads:
2,650
Score:
Unrated

Just when we thought we had BYOD under control, the world was introduced to a whole new animal of mobile devices: wearable technology. Whether information security professionals can control this new beast—running rampant and creating significant risk—is the question facing IT security today. BYOD and mobility remind me of the Jurassic Park film franchise. In…

+ read more

Travis Greene
Aug 18, 2015
12:03 pm
Reads:
2,435
Score:
Unrated

Recruiting is the life-blood of American college football. Although the word “compliance” may not first come to your mind when you think college football, compliance to recruiting regulations is critical to successful programs. College football is an immensely competitive sport, so getting the best recruits is essential. However, if a college doesn’t comply with recruiting…

+ read more

Travis Greene
Aug 13, 2015
7:08 am
Reads:
7,556
Score:
Unrated

Gartner predicts that by the year 2020, 26 billion devices will be connected to the Internet. All of these devices will make up the “things” of the oft-discussed Internet of Things (IoT). And the use of these connected devices, which can all communicate with each other, continues to expand. Even industries and communities that we…

+ read more

GeoffWebb
By: GeoffWebb
Jul 30, 2015
7:06 am
Reads:
8,730
Score:
4

You probably know Larry Ellison as the founder and current CTO of Oracle. But he’s also passionate about sailing—although “passionate” may be an understatement. Scuttleboat Sailing News reports that Ellison spent an estimated $500 million competing in the 2013 America’s Cup. While this amount of money is way more than most organizations’ annual security budget,…

+ read more

Travis Greene
Jul 28, 2015
7:44 am
Reads:
7,100
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow