Quantcast
Channel: Identity Week » Security Management
Browsing latest articles
Browse All 11 View Live

Why Privileged Identity Management Implementations Fail

As veterans of the privileged identity management (PIM) field, my colleagues and I hear some unsettling stories from organizations whose privileged identity management deployments did not provide the...

View Article



Don’t Overlook Database Security

Over the years I’ve been amazed by some of the questionable security practices that I’ve witnessed in some very large organizations. One big concern is casual attitudes that often prevail with respect...

View Article

Insider Threats, Misused Privileges are Leading Causes of Security Breaches

Last week Verizon Business released its 2010 Data Breaches and Investigations Report with some fascinating results. According to the report, 48% of data breaches are caused by insider threats, up from...

View Article

Where is Lieberman Software in September?

Now that Labor Day is behind us, we’re marching into fall and entering a very busy time period. Tradeshows, webinars and a multitude of events abound and we’re hitting the road.  I will be speaking at...

View Article

Video: Privileged Identities Explained

As an IT professional you already know the challenges of discovering, managing and auditing the privileged identities that exist on computer operating systems, network and backup appliances, directory...

View Article


Your Top Insider Threat

A new Network World article profiles the threat of system administrators who can intentionally or accidentally harm your organization through misuse of privileged identities. Absent the right kinds of...

View Article

Security Expert Michael C. Theis Discusses the Insider Threat

Michael C. Theis has more than 25 years of experience as a counterintelligence special agent and 30+ years of concurrent work in computer systems engineering. He directs cyber threat management...

View Article

Another Security Tax on Microsoft Serves No Purpose

I was asked recently: “Should Microsoft be trying to solve the weaknesses in its much-used software by providing security bundled into its own software, or should it provide money for research by...

View Article


Fast Track to CAG 12 Compliance

If you’ve ever been subject to typical IT security compliance regulations you’ve no doubt experienced the frustration of putting into action what can at times seem like complex, almost unintelligible...

View Article


Beyond Regulatory Compliance

In general, there are plenty of governance and compliance frameworks that minimize risk and improve operational security and reliability. But true security is an ongoing strategic imperative that...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images