In government, gaining access to privileged accounts is a hacker’s dream. Without proper management, these accounts offer unlimited access to a wealth of valuable information.
Our on-demand knowledge webcast series, addressing the directives Federal CIO Tony Scott gave to agencies for the 30-day Cybersecurity Sprint concludes with a discussion of the fourth and final directive:
“Dramatically accelera...
Watch Now: OnDemand Webcast
Learn IAM best practices to keep your systems compliant and secure.
Your IT systems and process have to be compliant, and they have to be secure. That’s why, ideally, your security investments should also help with..…
Most of us know what Two Factor Authentication is after all it has been with us for over 25 years. But while we have all been busy things have been changing slowly and steadily, especially when it comes to choosing whether to deploy hardware, softwa…
I’ve been there and asked that question. When I was a state IT manager, knowing that service account password was just part of keeping things running on a day to day basis. My team knew it and members of our security and server teams knew it.
...
“The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.
Cloud and SaaS offerings affect businesses in the red…
Active Directory holds such a prominent position in the enterprise, that inadequate management and security of this universally accepted directory can be a major barrier to IAM success. For all its goodness, AD is woefully lacking in native manageme…
Exhibit A: Teacher gave me an overview of my child’s theory on school.
My 5 year old started kindergarten at public school this week. It’s not a huge difference for her – she’s attended daycare, preschool, pre-k for t...
I spend my days working with and for Federal Government agencies helping solve identity management challenges. Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security tha…
Read more about how the City of Bakersfield handles the increased use of mobile devices by the city’s police department and other field personnel.
Recently, I spent a few great days at Gartner Security Summit 2016. At security events like this