Security

This is an OpenSSL certificate toolkit utility leveraging OpenSSL’s CLI for Linux. This is a simple wrapper utility for OpenSSL CLI to help automate certificate tasks. Download here…

By: tdharris
May 2, 2016
11:15 am
Reads:
1,165
Score:
5

It seems that not even strong 2-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario can be devised to first login to a website and trigger a verification code sent to your phone. The attacker would then continue with a follow-up SMS message asking the user…

+ read more

Mar 1, 2016
2:09 pm
Reads:
1,116
Score:
Unrated

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
433
Score:
Unrated

“You better start swimming or you’ll sink like a stone for the times they are a-changin’,” Bob Dylan famously sang in 1964. “The Times They Are a-Changin’,” has become one of Dylan’s most recognized and well-loved songs. In fact, Steve Jobs recited the second verse of the song during the 1984 annual Apple shareholder meeting…

+ read more

GeoffWebb
By: GeoffWebb
Jun 25, 2015
7:36 am
Reads:
1,375
Score:
Unrated

Since eDirectory 8.8 was released Novell/NetIQ has provided the option to have multiple eDirectory instances on a single system, and to have these running either as ‘root’ or as a non-root user. There are benefits to both, but generally speaking it is a proven and best practice to run services as non-root users.

By: ab
Jun 17, 2015
9:12 am
Reads:
1,308
Score:
5

Previously I had posted a script for port redirection on the Identity Server. I’ve since found this doesn’t work too well when the local SLES firewall is enabled. The following is a better solution. First, create a Firewall Service file that contains the necessary ports to open (this assumes the Administration Console and Identity Server…

+ read more

ScorpionSting
Apr 14, 2015
1:09 pm
Reads:
1,206
Score:
4.5

To the casual observer, the Internet of Things (IoT) is just an ultra-convenient world of smart devices and sensors that can communicate. But behind the shiny exterior of do-everything consumer devices is a vast expanse of data that has the power to change the world. To illustrate the power of data, let me tell you…

+ read more

GeoffWebb
By: GeoffWebb
Mar 12, 2015
7:14 am
Reads:
2,434
Score:
Unrated

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
3,260
Score:
Unrated
This entry is part 3 of 5 in the series Sentinel Collector SDK 2014 Updates

This article is part of a series of articles diving into the new functionality present in the 2014 Preview Sentinel SDK. Today I will be covering the new documentation options and what they mean for those who have developed collectors previously, as well as all of us developing collectors now and in the future.

By: ab
Jan 15, 2015
3:29 pm
Reads:
1,546
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
1,427
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow