Security

“You better start swimming or you’ll sink like a stone for the times they are a-changin’,” Bob Dylan famously sang in 1964. “The Times They Are a-Changin’,” has become one of Dylan’s most recognized and well-loved songs. In fact, Steve Jobs recited the second verse of the song during the 1984 annual Apple shareholder meeting…

+ read more

GeoffWebb
By: GeoffWebb
Jun 25, 2015
7:36 am
Reads:
363
Score:
Unrated

Since eDirectory 8.8 was released Novell/NetIQ has provided the option to have multiple eDirectory instances on a single system, and to have these running either as ‘root’ or as a non-root user. There are benefits to both, but generally speaking it is a proven and best practice to run services as non-root users.

By: ab
Jun 17, 2015
9:12 am
Reads:
167
Score:
5

Previously I had posted a script for port redirection on the Identity Server. I’ve since found this doesn’t work too well when the local SLES firewall is enabled. The following is a better solution. First, create a Firewall Service file that contains the necessary ports to open (this assumes the Administration Console and Identity Server…

+ read more

ScorpionSting
Apr 14, 2015
1:09 pm
Reads:
428
Score:
5

To the casual observer, the Internet of Things (IoT) is just an ultra-convenient world of smart devices and sensors that can communicate. But behind the shiny exterior of do-everything consumer devices is a vast expanse of data that has the power to change the world. To illustrate the power of data, let me tell you…

+ read more

GeoffWebb
By: GeoffWebb
Mar 12, 2015
7:14 am
Reads:
1,024
Score:
Unrated

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
1,705
Score:
Unrated
This entry is part 3 of 5 in the series Sentinel Collector SDK 2014 Updates

This article is part of a series of articles diving into the new functionality present in the 2014 Preview Sentinel SDK. Today I will be covering the new documentation options and what they mean for those who have developed collectors previously, as well as all of us developing collectors now and in the future.

By: ab
Jan 15, 2015
3:29 pm
Reads:
767
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
780
Score:
Unrated
This entry is part 1 of 5 in the series Sentinel Collector SDK 2014 Updates

Working as a consultant on things Identity, Access, and Security I get to meddle with some really great products, and Sentinel is among those. Recent work building some customized collectors (for custom applications) has helped me find a few tidbits that I wish would have been more-obvious. Perhaps others, via this series of articles, will…

By: ab
Dec 31, 2014
10:40 am
Reads:
1,052
Score:
5

There are always configuration options that you find the first time you setup a new system, and then there are some that you find when you are asked for some odd business reason that may not have been as obvious on day one. One of these options for services is the ability to restrict which…

+ read more

By: ab
Dec 12, 2014
9:00 am
Reads:
841
Score:
5