Password Manager Pro | October 12, 2011How do you share privileged passwords in your enterprise? [Part-2] In the previous post, we had highlighted the casual manner in which privileged passwords...
Password Manager Pro | October 6, 2011How do you share privileged passwords in your enterprise? [Part-1] Assume that you are an IT administrator managing servers, databases, ...
DeviceExpert | October 3, 2011Flaws in security settings of device configurations == open invitation to intruders Assume that a department in your organization requests a temporary relaxation in the...
Password Manager Pro | September 26, 2011The price for information security shortcomings ... Just about four weeks back, the security incident in that company came to light. Today,...
DeviceExpert | September 19, 2011Switch or router crash: How do you get the replacement unit up and running? Planning for quickly recovering from the impact of unforeseen events is an integral part...
Password Manager Pro | September 12, 2011Perils of 'Static' Windows Service Accounts Windows Service Accounts, used by the system programs to run application software...
Password Manager Pro | August 26, 2011Allowing temporary access to sensitive IT resources Assume the scenario below: You administer a sensitive IT resource - a database in...
DeviceExpert | August 23, 2011How do you deploy configuration changes to production network? Administrators working on production networks often face the need to carry out changes to...
Password Manager Pro | August 18, 2011Deprovisioning administrative access: How careful are you? FBI investigation on Shionogi security incident reveals the involvement of a former...
DeviceExpert | August 11, 2011Managing Risk: Rapidly responding to security alerts from network device vendors Assume the scenario below:The Cisco Product Security Incident Response Team (PSIRT)...
Password Manager Pro | August 9, 2011An automated solution to enforce IT policy on standard password practices Growing instances of information security incidents have forced IT enterprises to put an...
Password Manager Pro | August 2, 2011Privileged password management: Protection alone is not sufficient Privileged password management has now emerged a key aspect of IT management. With ever...