Blog

Why Identity Governance Must Be a Top Priority as EU Privacy Deadline Looms

Latest News
Any organization that controls or processes data on consumers in the European Union (EU) will soon be required to comply with the General Data Protection Regulation (GDPR). The new law, which goes into effect May 25, 2018, is expected to have a sweeping impact on the data protection and privacy practices of companies worldwide. Those organizations that aren’t fully...

Using KPIs to Redefine IAM Success, Part 2

IAM
In part 1 of our series on Using KPIs to Redefine IAM Success, we began talking about why identity management projects fail — or at least why they are perceived to have failed. In most instances, organizations adopt identity management solutions to reduce the risk of unauthorized access to systems and data. However, criteria such as operational complexity and...

Why IAM Is Often Put on the Back Burner and Why It Shouldn’t Be

Kabir
So, you’ve just been breached. Now what? Many questions come to mind. Is the breach contained? Who was behind it? Were they internal or external? How did they get in? What did they get? Depending on your organization’s level of sophistication in response to such incidents, a number of processes, controls, and workflows will be initiated and checked. Some...

How to Breeze Through a Maximo Upgrade with No Downtime

MaxFactory
In late 2014, IBM released version 7.6 of its Maximo product, with new features designed to increase efficiency and reliability. Maximo 7.6 has a new user interface with a customizable dashboard that displays the most relevant information at a glance. Under the hood are many improvements in functionality and reporting that enhance the value of this enterprise asset management...

Using KPIs to Redefine IAM Success, Part 1

IAM
“The global identity and access management market is expected to swell to $24.55 billion by 2022, according to a new report from Grand View Research, Inc.” – Grandview Research, “Identity And Access Management Market Analysis By Deployment, By End-Use and Segment Forecasts To 2022″ ~ Organizations are prioritizing investments in identity and access management (IAM). In a recent survey...

The Role of Context in ICS Security Risk Assessment

SCADA
In our last post Understanding the Security Risks of Industrial Control Systems we discussed the growing security threat to the Industrial Control Systems (ICS) used to support critical infrastructure and drive processes in a number of industry sectors. Increasingly, ICS components and systems are connected via the public Internet rather than private networks. Many of these components have weak...

Understanding the Security Risks of Industrial Control Systems

ICS
An Industry Control System (ICS) component is a device, such as a digital controller, that accepts input, performs a specific function and provides output. For example, a digital controller in an HVAC unit might monitor ambient air temperature and tell the system to turn on or off based upon its settings. The definition of such a controller can be...

Why User Identities Are the Weak Link in Enterprise Security

PAS
According to the Identity Management Institute, more than 90 percent of all cyberattacks are successfully executed with credentials obtained from unwitting users. Spear phishing attacks are the most common method used to steal this information. It is easy and inexpensive for cybercriminals to send a fake email with a malicious attachment or link that downloads spyware to the victim’s...

Overcoming the Operational Obstacles to Privileged Account Security

Clango
Privileged account management is one of the most critical components of any enterprise security strategy. Cybercriminals prize privileged account credentials because they provide administrator-level access to servers, security systems, network devices, databases, applications and other resources. If hackers are able to obtain the “keys to the kingdom,” they gain virtually unfettered access to an organization’s systems and data. Best...

New Contract Award: SeaPort-e

seaporte-logo
DIT is pleased to announce that we have received a prime contract award as a result of the Seaport e Rolling Admissions solicitation N00178-16-R-4000. SeaPort-e is the Navy’s electronic platform for acquiring support services in 22 functional areas including Engineering, Financial Management, and Program Management. We look forward to pursuing Prime opportunities on the SeaPort IDIQ to compliment work...