The most recent content from our members.
The SCAR (See – Change – Audit – Request) framework is designed to help you gain control over user permissions across your IT infrastructure. The framework consists of four steps to enhance your overall security posture and audit permissions to your data and resources at any time—while making access rights management more…
We are pleased to introduce our latest Dameware Remote Everywhere Mac Agent Improvements. This release has been inspired by client feedback and is an area of real focus for us. This release brings a major revision to the UI presentation of Mac components and helps us interact with systems and users in the context of the…
When connecting an EOC to an Orion platform, add an option such that the connection/communication is initiated from the Orion platform to the EOC. This allows deployments in environments adhering to the Purdue security model to stay compliant using the security principle of "writing up, and reading down". That way if the…
“Security? We don’t need no stinking security!” I’ve actually heard a CTO utter words this effect. If you subscribe to a similar mindset, here are five ways you too can stink at information security. * Train once and never test Policy says you and your users need to be trained once a year, so once a year is good enough.…
We made it! This is the final post in this six-part series mapping the cybersecurity landscape through a new reference model for IT infrastructure security. Thank you for coming along on this journey with me. Now it’s time to take a look at where we’ve been, review the map itself, and discuss how to put it to work in your…
Had a great stay-cation last week. I made no plans except a quick overnight trip to the beach. It was wonderful doing nothing, catching up on sleep, and enjoying our backyard space. I highly recommend everyone find the time to do nothing; your body, mind, and spirit will thank you. As always, here are some links I hope you…
Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape into four domains that each contain six categories. While today’s domain may seem simple, it is an area that I constantly…
Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking about; you can still find them at many malls or theme parks, and even some downtown city streets. It’s usually a backlit map on a pillar with a…
It looks like you're new here. Sign in or register to get started.