Privileged Users

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

Travis Greene
May 19, 2016
2:11 pm
Reads:
5,715
Score:
Unrated

Recruiting is the life-blood of American college football. Although the word “compliance” may not first come to your mind when you think college football, compliance to recruiting regulations is critical to successful programs. College football is an immensely competitive sport, so getting the best recruits is essential. However, if a college doesn’t comply with recruiting…

+ read more

Travis Greene
Aug 13, 2015
7:08 am
Reads:
7,497
Score:
Unrated

You probably know Larry Ellison as the founder and current CTO of Oracle. But he’s also passionate about sailing—although “passionate” may be an understatement. Scuttleboat Sailing News reports that Ellison spent an estimated $500 million competing in the 2013 America’s Cup. While this amount of money is way more than most organizations’ annual security budget,…

+ read more

Travis Greene
Jul 28, 2015
7:44 am
Reads:
7,043
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow