NIST

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
2,327
Score:
5

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
57,951
Score:
Unrated

What are the risks associated with enterprise organizational structures, assets and processes? How can the enterprise identify and implement the appropriate measures to minimize the risks that those enterprise features inevitably create? These are the kinds of issues a risk framework need to address. Risks can come from innumerable sources, including uncertainty in financial markets,…

+ read more

David Shephard
Aug 7, 2013
9:33 am
Reads:
2,628
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow