Passwords

On February 9, President Obama published “Protecting U.S. Innovation from Cyberthreats” in The Wall Street Journal. The article outlined the cyber-focused portion of the federal budget proposal, which includes a new national plan giving $3 billion to kick-start an overhaul of the federal computer systems. According to the article, Obama’s new Cybersecurity National Action Plan…

+ read more

Michael Angelo
Feb 24, 2016
8:17 am
Reads:
1,771
Score:
4

Since WikiLeaks recently released thousands of hacked documents from Sony Entertainment Pictures, IT security professionals have been scouring the searchable database of 30,287 documents and 173,132 emails. Besides incriminating celebrity gossip, they found poor password practices that would make even your tech-illiterate grandparents cringe. Security analyst Graham Cluley points out several examples of these practices…

+ read more

GeoffWebb
By: GeoffWebb
Jun 16, 2015
7:33 am
Reads:
1,459
Score:
Unrated

The rise of mobility in the workplace is prompting government agencies to investigate using multi-factor authentication for access to applications while maintaining compliance to Homeland Security Presidential Directive 12 (HSPD 12). Issued in 2004, this directive mandates common identification standards for federal employees and contractors. Among other security measures, HSPD 12 resulted in the use…

+ read more

David Shephard
Jun 11, 2015
7:13 am
Reads:
1,559
Score:
5

The idea of driverless cars has fascinated pop culture for many years. From Herbie the Love Bug to KITT from Knight Rider, visions of cars that drive themselves continue to capture our imaginations. Unfortunately, as is the case of driverless cars, we can get ahead of ourselves when trying to develop and use certain technology….

+ read more

Travis Greene
May 26, 2015
3:26 pm
Reads:
1,523
Score:
Unrated

This document provides an example web script to assist one in enhancing the security and automation of internal or external web sites. This script was written for Google’s Gmail, but can be used as a baseline to get started for other sites.

Jan 7, 2015
11:39 am
Reads:
2,422
Score:
Unrated

This tutorial will explain how to configure GroupWise WebAccess as an AppMark for NetIQ CloudAccess/MobileAccess.  This feature is particularly useful for BYOD situations, such as when an employee wishes to access GroupWise, but does not wish to have corporate restrictions or store their corporate password on their personal device.  This tutorial has three main components:…

+ read more

Matthew Ehle
Feb 6, 2014
2:09 pm
Reads:
3,123
Score:
3

Sometimes, especially in IDM large deployments we can see scenarios where another provider installs the Remote Loader on their servers and obviously we do not have access to it. As we know, both the Remote Loader and App passwords, lives and are determined on the remote server. If you do not have access to that…

+ read more

debianized
Sep 11, 2013
5:08 pm
Reads:
3,809
Score:
5

Passwords are the bane of any security administrator’s life. While the theoretical ideal would be to permit access to systems using two-factor authentication, real-world implementation is rarely simple and often expensive. What’s more, without the right incentives and consumer buy-in, end users may find the additional procedures complex and inconvenient. So why do we care…

+ read more

David Shephard
Jul 22, 2013
9:01 am
Reads:
2,202
Score:
Unrated

This article explains how you can use the NMAS HOTP login method together with the YubiKey hardware token from Yubico.

Jul 9, 2013
4:40 pm
Reads:
3,675
Score:
4.67

The Report shows a password age report and calculates the number of days since the password was reset.

jacksonse
By: jacksonse
Jun 29, 2013
8:54 am
Reads:
1,871
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow