The most recent content from our members.
Currently to fetch Cloudwatch data or RDS details the Vivid client requires an IAM user and access keys. Slightly more modern solutions (last few years) use service accounts to give IAM permissions which requires the underlying application SDK to pick up the AWS_ROLEARN and access key off the file system to receive…
In this recent blog post post by Earl Perkins of Gartner, he describes some of the factors behind the increased challenge of supporting mobile workers for security and access to mobile applications. Some of those trends include: * The improved capabilities (ease of use) of different multiple devices is causing pressure on…
Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape into four domains that each contain six categories. While today’s domain may seem simple, it is an area that I constantly…
A couple of weeks ago, I was pleasantly surprised to find that Neil Gershenfeld would be giving the keynote at a large East Coast security conference I was attending. I’ve been a fan of the fabrication movement pioneered by people like Gershenfeld for a few years. I’ve been humbled to see how tools like 3D printers and…
Hi, I'm running WPM 2.1, and I'm running into a few problems which I'm trying to troubleshoot - thus, I'm looking for any advice/ideas. 1: I have run into a situation where we use Oracle's IAM WebGate, where the URL is modified after navigation is completed. Thus, Target URL becomes separate URL altogether, without using…
It looks like you're new here. Sign in or register to get started.