Quantcast
Channel: identity and access management – Fox Technologies
Browsing all 22 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The CIA Secret to Cybersecurity That No One Seems to Get

IF YOU WANT to keep yourself up at night, spend some time reading about the latest developments in cybersecurity. Airplanes hacked, cars hacked, vulnerabilities in a breathtaking range of sensitive...

View Article


Image may be NSFW.
Clik here to view.

Ho Ho Ho – Thanks Santa – A SteamOS Console. Oh-Oh, Oh Noooo!

Last week the Playstation 4 console was comprehensively pwned yet again (an OpenBSD flaw this time as it turns out), so in the 2015 festive holiday season we thought it would be fun to have a look at...

View Article

Image may be NSFW.
Clik here to view.

DNC Database Breach – Another Preventable Mess

This was not a breach in any classic sense. What happened here is that a patch was applied to a database, and that patch appears to have removed certain safeguards that would prevent one party from...

View Article

Image may be NSFW.
Clik here to view.

The Best Things in Life are Free!

Happy Holidays from all of us at Fox Technologies! Original Source: www.seppo.net/e/ You may also be interested in: Best Practices for Unix/Linux Privileged Identity and Access Management FoxT Access...

View Article

Image may be NSFW.
Clik here to view.

Data security is ‘deplorable,’ say hackers at CCC meeting

Germany’s Chaos Computer Club is holding its annual congress – and 12,000 online activists have gathered for Europe’s largest hacking conference. They accuse Google, Apple and Youtube of limiting...

View Article


Image may be NSFW.
Clik here to view.

The most innovative and damaging hacks of 2015

The year’s most significant attacks highlight how hackers are changing tactics — and how security must evolve in the year ahead. Not a week went by in 2015 without a major data breach, significant...

View Article

Image may be NSFW.
Clik here to view.

How Administrative Safeguards Can Prevent Data Breaches

Preventing healthcare data breaches is a common goal for covered entities of all sizes. It can be easy to let the importance of administrative safeguards fall behind other areas, such as concerns over...

View Article

Image may be NSFW.
Clik here to view.

Mysterious Data Breach Exposes 191 Million Voter Records

When it comes to voting, there are basically two arguments: a civic one, which states that voting is the moral duty of every able citizen in a democracy, and an economic one, which states that voting...

View Article


Image may be NSFW.
Clik here to view.

Security’s Biggest Winners and Losers of 2015

THIS YEAR, LAWMAKERS surprised us by taking initial steps—albeit, baby ones—to rein in some of the NSA’s mass spying and provide better oversight of the intelligence agency’s activities. It’s unclear,...

View Article


Image may be NSFW.
Clik here to view.

The Biggest Security Threats We’ll Face in 2016

2015 has been the year where social engineering became the common trend among many high-profile breaches – resulting in hundreds of millions of compromised records. Going into 2016, Wired Magazine is...

View Article

Image may be NSFW.
Clik here to view.

Infographic: The Growing Linux Wave

The Growing Linux Wave: POINTS TO DEMAND FOR IDENTITY AND ACCESS MANAGEMENT SOLITIONS According to a Linux Foundation’s end-user trends report, Linux leads the way in enterprise deployments. Fox...

View Article

Image may be NSFW.
Clik here to view.

SWIFT and PCI-DSS: New Approaches Needed for Assurance in a World of Non-stop...

At the official start of summertime 2016 in Britain we are starting to consume the labor of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine...

View Article

Image may be NSFW.
Clik here to view.

Marginal Gains – A philosophy to live by?

I don’t know about you at the tail end of the Summer of 2016, but I am really missing the daily breakfast review of the performances at the Olympics this week; and sitting down early evening engrossed...

View Article


Image may be NSFW.
Clik here to view.

Download Report Now: 2017 Cyberthreat Defense Report

Download CyberEdge’s fourth-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,100 IT security professionals representing 15 countries and 19 industries. Key insights...

View Article

Image may be NSFW.
Clik here to view.

Infographic: CIO/CISO Sprint to Survive

Given today’s evolving threat landscape, it’s understandable that organizations want to take a proactive approach against threats, create an environment of continuous compliance, and have responsive IT...

View Article


Image may be NSFW.
Clik here to view.

Ransomware on Linux – Think you’re off the hook?

You have to feel for all Windows support teams worldwide right now after being hit with the largest ransomware attack in internet history. Wannacry has meant a busy weekend of tedious manual effort for...

View Article

Image may be NSFW.
Clik here to view.

Can Too Much Active Directory Be A Bad Thing?

Identity Access Management (IAM) I just read a recent article about IAM (Identity Access Management) projects, and the level of complication that can ensue when trying to plan and implement a project...

View Article


Image may be NSFW.
Clik here to view.

SSH Management With BoKS ServerControl Software

Sponsored reports from analysts have focused on poor key and SSH management practices, a highly speculative assertion that Edward Snowden somehow used keys to gain access to systems (which he denies),...

View Article

Image may be NSFW.
Clik here to view.

Ransomware on Linux – Think you’re off the hook?

You have to feel for all Windows support teams worldwide right now after being hit with the largest ransomware attack in internet history. Wannacry has meant a busy weekend of tedious manual effort...

View Article

Image may be NSFW.
Clik here to view.

Can Too Much Active Directory Be A Bad Thing?

Identity Access Management (IAM) I just read a recent article about IAM (Identity Access Management) projects, and the level of complication that can ensue when trying to plan and implement a project...

View Article
Browsing all 22 articles
Browse latest View live