Access Control - Infoworld http://www.infoworld.com/t/3260 en You want to know who has access to what? Good luck http://www.infoworld.com/d/security/you-want-know-who-has-access-what-good-luck-239018?source=rss_access_control <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="You want to know who has access to what? Good luck" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Security Access Control Endpoint Protection Identity Management Security Tue, 25 Mar 2014 10:00:00 +0000 Roger A. Grimes 239018 at http://www.infoworld.com How to benefit from the identity data explosion http://www.infoworld.com/t/security/how-benefit-the-identity-data-explosion-236619?source=rss_access_control <p><em>Week in and week out, big-name companies from Target to Neiman Marcus to Michaels learn the severe consequences of flawed data security. The truth is, even when IT has been armed with the latest security technology, defending against breaches isn't easy. In fact, as attacks get more and more sophisticated, it's getting harder.</em></p> Big Data Business Intelligence Security Access Control Big Data Identity Management Security Thu, 20 Feb 2014 11:00:00 +0000 New Tech Forum 236619 at http://www.infoworld.com Target attack shows danger of remotely accessible HVAC systems http://www.infoworld.com/d/security/target-attack-shows-danger-of-remotely-accessible-hvac-systems-235919?source=rss_access_control <p>The massive <a href="http://www.infoworld.com/d/security/target-says-40-million-cards-likely-skimmed-in-security-breach-232946">Target breach</a> led to revelations that many companies use Internet-connected heating, ventilation, and air conditioning (HVAC) systems without adequate security, giving hackers a potential gateway to key corporate systems, a security firm warned Thursday.</p> Security Access Control Cyber Crime Data Security Hacking Fri, 07 Feb 2014 13:29:01 +0000 admin 235919 at http://www.infoworld.com Book smart, security stupid: Rogue professors flunk Security 101 http://www.infoworld.com/t/it-jobs/book-smart-security-stupid-rogue-professors-flunk-security-101-235176?source=rss_access_control <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/18OPsecadvise_hp.jpg" alt="Book smart, security stupid: Rogue professors flunk Security 101" width="243" height="182" align="right" /></div><p>If anyone wants to study human nature, they should tag along with IT pros for a few days. We see it all, the many shades of good and bad.</p> your IT tales Access Control IT Jobs IT Management IT Training Application Security Tech Support Identity Management Wed, 29 Jan 2014 11:00:00 +0000 Anonymous 235176 at http://www.infoworld.com EMC's Syncplicity service tightens controls on shared files http://www.infoworld.com/d/security/emcs-syncplicity-service-tightens-controls-shared-files-230297?source=rss_access_control <p>EMC will give users of its Syncplicity file-sharing and synchronization service more control over how their data can be accessed and used, including the ability to make files "time out" on a certain date wherever they may be stored.</p> Cloud Computing Security Access Control Cloud Storage Data Security Encryption Wed, 06 Nov 2013 13:17:48 +0000 admin 230297 at http://www.infoworld.com Alcatel-Lucent challenges Cisco, Brocade unified access http://www.infoworld.com/d/networking/alcatel-lucent-challenges-cisco-brocade-unified-access-228861?source=rss_access_control <p><a href="http://www.networkworld.com/news/2013/100813-alcatel-lucent-to-cut-15000-jobs-274609.html" target="_blank">Alcatel-Lucent</a> is offering its enterprise switch users a free software upgrade to converge wired Ethernet networks with wireless from Aruba Networks.</p> <p>Aruba and Alcatel-Lucent have had a longtime partnership to jointly market and integrate each other's products. This software upgrade is an extension of that and is designed to bring all campus networking products under one view with consistent BYOD management.</p> Mobile Technology Networking Security Access Control BYOD Network Management Network Switch Mobile Device Management (MDM) Wed, 16 Oct 2013 11:57:42 +0000 admin 228861 at http://www.infoworld.com 'Jump boxes' improve security, if you set them up right http://www.infoworld.com/d/security/jump-boxes-improve-security-if-you-set-them-right-228742?source=rss_access_control <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/desktops_floating_hp_0.jpg" alt="'Jump boxes' improve security, if you set them up right" width="243" height="182" align="right" /></div><p>With malicious hackers and malware infesting nearly every enterprise network these days, "jump boxes" have become very popular.</p> Security Access Control Authentication Malware Security Management Security Tue, 15 Oct 2013 10:00:00 +0000 Roger A. Grimes 228742 at http://www.infoworld.com Cisco patches vulnerabilities in some security appliances, switches, and routers http://www.infoworld.com/d/security/cisco-patches-vulnerabilities-in-some-security-appliances-switches-and-routers-228551?source=rss_access_control <p>Cisco Systems has released security patches for authentication bypass, command execution and denial-of-service vulnerabilities affecting products that use its Adaptive Security Appliance (ASA) software, as well as the Cisco Catalyst 6500 series switches and Cisco 7600 series routers.</p> <p>Cisco released new versions of its ASA software to address six denial-of-service vulnerabilities in various components and three authentication bypass vulnerabilities in remote access services.</p> Networking Security Access Control Authentication Network Management Patch Management VPN Vulnerability Assessment Thu, 10 Oct 2013 18:55:04 +0000 admin 228551 at http://www.infoworld.com Cisco fixes critical remote command execution vulnerability in Secure Access Control Server http://www.infoworld.com/d/security/cisco-fixes-critical-remote-command-execution-vulnerability-in-secure-access-control-server-225851?source=rss_access_control <p>Cisco Systems released security patches for Secure Access Control Server (Secure ACS) for Windows to address a critical vulnerability that could allow unauthenticated attackers to remotely execute arbitrary commands and take control of the underlying operating system.</p> Security Cisco Systems Access Control Authentication Patch Management Vulnerability Assessment Thu, 29 Aug 2013 13:44:15 +0000 admin 225851 at http://www.infoworld.com Those 'invisible' servers could open your network to hackers http://www.infoworld.com/d/data-explosion/those-invisible-servers-could-open-your-network-hackers-224019?source=rss_access_control <p>I've written before about the huge benefits you can reap if you <a href="http://www.infoworld.com/d/data-explosion/when-the-data-center-goes-down-preparing-the-big-one-197158">plan for large sitewide outages</a> by giving yourself access to all the troubleshooting tools you'll need ahead of time. These days, that almost always includes access to a bevy of embedded management interfaces.</p> Data Center Data Explosion Security Access Control Disaster Recovery Hacking Network Security Security Management IDG Insider Mon, 05 Aug 2013 10:00:00 +0000 Matt Prigge 224019 at http://www.infoworld.com Should you create a separate, supersecure network? http://www.infoworld.com/d/security/should-you-create-separate-supersecure-network-223655?source=rss_access_control <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Reality-Check-Network_hp.jpg" alt="Should you create a separate, supersecure network?" width="243" height="182" align="right" /></div><p>All companies that have been pwned by <a href="http://www.infoworld.com/d/security/5-signs-youve-been-hit-advanced-persistent-threat-204941">APT (advanced persistent threat)</a> adversaries look for ways to fend off future threats.</p> Security Access Control Application Security IT Strategy Data Security Security Tue, 30 Jul 2013 10:00:00 +0000 Roger A. Grimes 223655 at http://www.infoworld.com Annoying programs vendors trick you into installing http://www.infoworld.com/slideshow/112235/annoying-programs-vendors-trick-you-installing-223423?source=rss_access_control <!--paging_filter-->A look at the slowing, system-gunkifying software that you don't want on your system but is nonetheless there<div class="field field-type-text field-field-slideshow-dek"> <div class="field-label">Dek:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> A look at the slowing, system-gunkifying software that you don&#039;t want on your system but is nonetheless there </div> </div> </div> <div class="field field-type-text field-field-slideshow-external-source"> <div class="field-label">External Source:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> networkworld.com </div> </div> </div> <div class="field field-type-text field-field-slideshow-url-redirect"> <div class="field-label">Redirect Unpublished Slideshow to:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> http://www.infoworld.com/slideshow/112235 </div> </div> </div> Access Control Business Process Management Sat, 27 Jul 2013 10:00:00 +0000 admin 223423 at http://www.infoworld.com Why Sun's NIS will never die http://www.infoworld.com/d/data-center/why-suns-nis-will-never-die-219683?source=rss_access_control <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/sun-superhero_hp.jpg" alt="Why Sun's NIS will never die" width="243" height="182" align="right" /></div><p>NIS (nee YP) appears to be immortal. It's almost 30 years old, and it is still in widespread use today. Data Center Networking Security Access Control Linux Unix Data Center Networking Security Mon, 03 Jun 2013 10:00:00 +0000 Paul Venezia 219683 at http://www.infoworld.com Too many admins spoil your security http://www.infoworld.com/d/security/too-many-admins-spoil-your-security-218023?source=rss_access_control <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Security_lock_2_hp.jpg" alt="Too many admins spoil your security" width="243" height="182" align="right" /></div> <p>We've all known for a long time that <a href="http://www.infoworld.com/d/security-central/putting-limits-users-privileges-290">unnecessary use of elevated privileges is a bad thing</a>.</p> Security Access Control Security Tue, 07 May 2013 10:00:00 +0000 Roger A. Grimes 218023 at http://www.infoworld.com 5 hot security defenses that don't deliver http://www.infoworld.com/d/security/5-hot-security-defenses-dont-deliver-217045?source=rss_access_control <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/laptop_hands.jpg" alt="5 hot security defenses that don't deliver" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Big Data Security Access Control Big Data Anti-virus Authentication Cyber Crime Hacking Malware Security Tools Security Tue, 23 Apr 2013 10:00:00 +0000 Roger A. Grimes 217045 at http://www.infoworld.com What you can do about Chinese APT attacks http://www.infoworld.com/d/security/what-you-can-do-about-chinese-apt-attacks-213481?source=rss_access_control <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/FE10paranoid-hp.jpg" alt="What you can do about Chinese APT attacks" width="243" height="182" align="right" /></div><p>Do you work for a company that has developed valuable intellectual property related to technology? Security Access Control Intellectual Property Cyber Crime Data Security Endpoint Protection Hacking Intrusion Detection Tue, 26 Feb 2013 11:00:00 +0000 Roger A. Grimes 213481 at http://www.infoworld.com Survey shows U.S. falling behind on user-centered BYOD http://www.infoworld.com/d/consumerization-of-it/survey-shows-us-falling-behind-user-centered-byod-212811?source=rss_access_control <p>U.S. corporations tend to be far more concerned with the brand of mobile devices in the workplace and less worried about which employees have access to company data, <a href="http://www.quest.com/documents/byod-putting-users-first-produces-biggest-gains-fewest-setbacks-datasheet-19142.pdf" target="_blank">according to a Dell survey of 1,500 senior IT managers in 10 countries</a>. The survey looked at bring-your-own-device (BYOD) trends and plans.</p> Consumerization of IT Mobile Technology Access Control BYOD IT Management Mobile Device Management (MDM) Smartphones Tablets Thu, 14 Feb 2013 12:02:32 +0000 admin 212811 at http://www.infoworld.com ForeScout integrates its NAC with AirWatch's mobile management http://www.infoworld.com/d/consumerization-of-it/forescout-integrates-its-nac-airwatchs-mobile-management-212298?source=rss_access_control <p>ForeScout Technologies and AirWatch have integrated their respective products for network access control and mobile management in a bid to give IT departments better control over devices that employees bring to work.</p> Consumerization of IT Mobile Technology Access Control BYOD Mobile Device Management (MDM) Tue, 05 Feb 2013 22:08:44 +0000 admin 212298 at http://www.infoworld.com Samba 4 review: No substitute for Active Directory -- yet http://www.infoworld.com/d/networking/samba-4-review-no-substitute-active-directory-yet-211318?source=rss_access_control <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/samba_grid.jpg" alt="Samba 4 review: No substitute for Active Directory -- yet" width="243" height="182" align="right" /></div><p>Samba 4.0 is <a href="http://www.infoworld.com/d/open-source-software/samba-4-threatens-microsofts-enterprise-lock-in-209024">a milestone release that brings Active Directory functionality</a> to the open source SMB/CIFS (Server Message Blo</p> Microsoft Windows Networking Open Source Software Security Active Directory Access Control Linux Microsoft Windows Unix Network Management Networking Security Wed, 23 Jan 2013 11:00:00 +0000 Doug Dineley 211318 at http://www.infoworld.com Google looks to kill passwords, but experts say not so fast http://www.infoworld.com/d/security/google-looks-kill-passwords-experts-say-not-so-fast-211195?source=rss_access_control <p>Google's security team is experimenting with ways to replace passwords for logging in to websites. But while acknowledging passwords alone are no longer enough to protect users, security experts believe they shouldn't be tossed.</p> Security Google Access Control Authentication Password Security Tue, 22 Jan 2013 13:47:48 +0000 admin 211195 at http://www.infoworld.com