risk

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
2,078
Score:
5

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

Travis Greene
May 19, 2016
2:11 pm
Reads:
5,707
Score:
Unrated

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
5,646
Score:
5

On February 9, President Obama published “Protecting U.S. Innovation from Cyberthreats” in The Wall Street Journal. The article outlined the cyber-focused portion of the federal budget proposal, which includes a new national plan giving $3 billion to kick-start an overhaul of the federal computer systems. According to the article, Obama’s new Cybersecurity National Action Plan…

+ read more

Michael Angelo
Feb 24, 2016
8:17 am
Reads:
6,841
Score:
4

Introduction   There are some requirements for enterprises such as policy restriction of client location to access Office 365 services. For example STS token has to be sent only for activesync client. Or allow only internal client IPAddress. Solution   Office 365 sends information about application name, client IP, useragent, proxy information to STS as…

+ read more

By: cstumula
Apr 20, 2015
1:59 pm
Reads:
6,719
Score:
Unrated

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
4,280
Score:
Unrated

Beyond traditional password-based authentication, you may be looking for additional protection for your valuable online resources, that is easy to implement and transparent to the user. The answer is adaptive, or risk-based, authentication.

By: cstumula
Jan 20, 2014
2:22 pm
Reads:
7,050
Score:
Unrated

In an earlier blog post: Cloud Computing Brings Chance of Showers, published by SC Magazine in their The SC Magazine Awards Blog, I identified potential security issues associated with cloud computing. While those issues may slightly reduce the full potential of the cloud, the question you have to ask yourself is: “Does the value of…

+ read more

Michael Angelo
Feb 25, 2011
10:30 am
Reads:
3,934
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow