• Compartilhar
  • ?
  • Perfis ▼
  • Comunidades ▼
  • Aplicativos ▼

Blogs

  • Meus Blogs
  • Blogs Públicos
  • Minhas Atualizações

  • Efetue login para participar

SOBRE ESTE BLOG

Welcome to the Security and Risk Management Blog, where you can read the perspectives from security and risk management experts. This Blog provides insights into the security and risk management solution, as well as technical details about specific IBM pr
  • Facebook
  • Twitter
  • Google
  • LinkedIn
  • RSS

TERMOS MAIS POPULARES


Archive

  • agosto de 2017
  • julho de 2017
  • maio de 2017
  • agosto de 2013
  • julho de 2013
  • dezembro de 2012
  • novembro de 2012
  • outubro de 2012
  • setembro de 2012
  • agosto de 2012
  • julho de 2012
  • junho de 2012
  • maio de 2012
  • setembro de 2011
  • agosto de 2011
  • julho de 2011

TWEETS RECENTES

    TODAS AS PUBLICAÇÕES
    • Classificar por:
    • Data ▲
    • Título
    • Curtir
    • Comentários
    • Visualizações

    Welcome to the Security and Risk Management Blog

    obriend 120000NV9S | | Visits (3425)

    Tweet
    Welcome to the Security and Risk Management blog.  This blog is one of several within the Service Management Connect community, and its purpose is to provide readers with ideas and perspectives about the security and risk management solution directly from the technical experts. Follow this blog, and you can get tips, tricks, and perspectives on several security and risk management topics, including: Installation Integration Performance Customization Technical tips and tricks More... If you have specific topics for which you would like... [More]

    Marcações:  overview blog welcome

    Practical approach to Role Management

    casco 120000GE63 | | Visits (5749)

    Tweet
    These days “role management” or “identity and access governance” has taken the limelight for anything related to Identity and Access Management projects.     IT organizations are eager to understand what these technologies provide, and want to ensure that these functions are covered in any of their identity management project bids.    Role management is really only a portion of Identity and Access Governance, but its underlying benefits are clear and compelling: better handling over access assignment growing demands, facilitating... [More]

    Marcações:  modeling access identity and mining governance management security role

    Tivoli Access Manager for Single Sign-On support resources

    SueCohen 2700013X10 | | Visits (2579)

    Tweet
    I'm thrilled to find the all the documentation and support resources for the Tivoli Access Manager for Single Sign-On product on their Tivoli Doc Central page:    http://www.ibm.com/developerworks/wikis/display/tivolidoccentral/Tivoli+Access+Manager+for+Enterprise+Single+Sign-On   Kudos to the Tivoli Access Manager for Single Sign-On team for providing this all-in-one resource.

    Marcações:  doc-central

    Facebook IPO and OAuth

    powers-old-account 270000NC1K | | Visits (4367)

    Tweet
      The Facebook IPO stumble has rekindled the usual hand-wringing about Facebook’s long term viability in light of the many failed social networking services in the past. But Facebook’s role as an identity service provider using the OAuth standard give it hope of overcoming the Facebook IPO stumble and staying in business when the Next Big Thing comes along and steals away the end users’ attention from their Facebook news feed. [Read this post.]

    Marcações:  security facebook oauth

    Flame malware and Leaky Abstraction

    powers-old-account 270000NC1K | | Comment (1) | Visits (4040)

    Tweet
    The Flame malware was over-hyped. But it’s a good exercise in threat modeling. In my model, the attacker’s strategy is “leaky abstraction.” [Read this post.]

    Marcações:  flame security security-intelligence threat-modeling

    Mitt Romney Email Hack Shames Hotmail

    powers-old-account 270000NC1K | | Visits (2964)

    Tweet
    Gawker is reporting the Mitt Romney Email Hack story. Once again a public email service is embarrassed by a gaping hole in its security which is widely known and easily fixed. What you can do to protect yourself and simple low cost alternative’s to the so-called “security questions.”

    Marcações:  email mitt_romney hotmail security

    CloudFlare Hack and More Password Reset Woes

    powers-old-account 270000NC1K | | Visits (3936)

    Tweet
     The CloudFlare hack is interesting not because of the damage that was done, but because of the multiple authentication system failures that were exploited to make it happen. It also sheds some light on the Achilles’ Heel of web-based services, the password reset procedure.  http://www.itsecurityzone.com/cloudflare-hack/  

    Marcações:  password-reset cloudflare security

    The LinkedIn Password Hack and Risk Transfer

    powers-old-account 270000NC1K | | Visits (4042)

    Tweet
    In the aftermath of the LinkedIn password hack, much of the discussion has focused on secondary security issues like password hash algorithms and salting. But the root cause security issue and how to mitigate its risk are being overlooked.  http://goo.gl/fi57K

    Marcações:  risk-management linkedin security

    Medical Data Flight Recorder Requirements?

    powers-old-account 270000NC1K | | Visits (3107)

    Tweet
    The FDA’s Office of Science and Engineering Laboratories referenced work in its FY 2011 report to collect requirements for medical data flight recorders in medical devices. Isn’t there a large mature in   dustry in event management that can be applied to this?   [Read this post.]

    Marcações:  security siem

    Announcing the Secure Password Reset Campaign

    powers-old-account 270000NC1K | | Visits (3367)

    Tweet
    Announcing the Secure Password Reset Campaign to end unsafe password reset procedures on web applications. [Read this post.]

    Marcações:  hacktivism security identity management pwdreset

    IBM EMEA Tivoli and Security Technical Conference

    LB_71GX 10000071GX | | Visits (3065)

    Tweet
                            Gain Visibility, Control and Automation across your organization and infrastructure boundaries. Are you looking to increase your personal skills in the Service Management arena? Are a responsible for a team of Tivoli professionals who need to delve deeper into the products? Would you or your team benefit from learning deep technical skills from real experts in their fields? Then the EMEA Tivoli & Security Technical Conference 2012 is just what you need! Click here to learn more! One of the many business benefits of... [More]

    Marcações:  conference europe emea education

    Article 29 Data Protection Working Party on Cloud: Buyer Beware

    powers-old-account 270000NC1K | | Visits (3215)

    Tweet
    The European Commission’s Article 29 Data Protection Working Party has issued a lengthy paper codifying the principle of “buyer beware” in its approach to cloud service providers in member states. [Read this post.]

    Marcações:  privacy european-union security

    Adding Social Media to your Product Support Toolkit

    ScottPeluso 0600028Q2J | | Visits (2885)

    Tweet
    The Internet is changing the face of product support. It is an undeniable fact that the manner in which we attempt to resolve problems, be they complex software applications or finding the closest Italian restaurant, is entirely different than 10, 5, or even 2 years ago. In all facets of our daily lives, how we search for answers to even the simplest of problems have been forever changed through online technology and capabilities. The Internet permeates all aspects of our lives; how many readers of this blog post do not understand... [More]

    Marcações:  social support business

    Amazon and Apple Account Hack: A Trifecta of Security Flaws

    powers-old-account 270000NC1K | | Visits (3642)

    Tweet
    The recent Amazon / Apple account hack shows three examples of the same type of fundamental security flaw: using personal information as a credential. [Read this post.]

    Marcações:  amazon strong-authentication pwdreset apple security authentication

    Privilege Escalation at the Low End

    powers-old-account 270000NC1K | | Visits (2981)

    Tweet
        “All or nothing” authentication for low end privilege escalation hampers end-user adoption due to the inconvenience associated with authentication. [Read this post.]

    Marcações:  authentication security mobile
    • Mostrar:
    • 10
    • 20
    • 30
    • Anterior
    • Avançar
    1 2 3