least privilege

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
5,652
Score:
5

Since eDirectory 8.8 was released Novell/NetIQ has provided the option to have multiple eDirectory instances on a single system, and to have these running either as ‘root’ or as a non-root user. There are benefits to both, but generally speaking it is a proven and best practice to run services as non-root users.

By: ab
Jun 17, 2015
9:12 am
Reads:
2,606
Score:
5

The idea of driverless cars has fascinated pop culture for many years. From Herbie the Love Bug to KITT from Knight Rider, visions of cars that drive themselves continue to capture our imaginations. Unfortunately, as is the case of driverless cars, we can get ahead of ourselves when trying to develop and use certain technology….

+ read more

Travis Greene
May 26, 2015
3:26 pm
Reads:
2,102
Score:
Unrated

The 2014 Global Economic Crime Survey conducted by PwC shares a startling statistic about cyberattacks: “seven percent of U.S. organizations lost $1 million or more due to cybercrime incidents in 2013, compared with three percent of global organizations; furthermore, 19 percent of U.S. entities reported financial losses of $50,000 to $1 million, compared with eight…

+ read more

Travis Greene
May 21, 2015
10:04 am
Reads:
2,369
Score:
Unrated

How is managing user access to IT resources like managing customer access to movies at a megaplex theater? Both megaplex managers and IT managers must weigh the cost of enforcing access rules. Megaplex rules generally prohibit theater hopping, the practice of paying to see one movie, then sampling other movies in the megaplex for free….

+ read more

Travis Greene
Apr 16, 2015
7:27 am
Reads:
2,218
Score:
Unrated

NetIQ is pleased to announce NetIQ Access Review 1.1, the latest update to NetIQ Identity & Access Management Solutions. NetIQ Access Review is a new addition to NetIQ’s strong portfolio of access governance solutions. By offering both NetIQ Access Review and NetIQ Access Governance Suite, we are giving our customers greater flexibility when determining the…

+ read more

Amie Johnson
Feb 3, 2015
6:00 am
Reads:
2,428
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow