• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:security

Identity and access management | January 2, 2015

2014 Security Year in Review

Whew! Thank goodness 2014 is over! Well, at least if you are considering the year's...

Identity and access management | December 4, 2014

Securing Active Directory Delegations Challenge

I have a challenge for you this week! After all, everyone loves a challenge. This one is...

Identity and access management | November 27, 2014

Active Directory Admins: Someone Has To Work Over Thanksgiving!

Happy Thanksgiving! I hope everyone reading enjoys too much turkey, ham (my favorite),...

Identity and access management | November 21, 2014

Auditing vs. Monitoring of Active Directory

​I just finished a class where I had both auditors and administrators in attendance. It...

Identity and access management | November 7, 2014

Monitoring of Active Directory Changes Made Easy

​​There are some things that Microsoft builds into their product that are just amazing,...

Active Directory Delegation: It Does Not Need to Be Hard!

ADManager Plus | October 23, 2014

Active Directory Delegation: It Does Not Need to Be Hard!

One of the most important and powerful reasons that organizations consider Active...

Trusting Microsoft Baseline Security Analyzer 2.3

Identity and access management | September 11, 2014

Trusting Microsoft Baseline Security Analyzer 2.3

Not too long ago, Microsoft updated, or at least updated the version of the Microsoft...

Identity and access management | September 4, 2014

My iCloud Password is “iCloud”

I guess the editor at MCP Magazine who fired me for talking about passphrases and ways to...

Identity and access management | August 29, 2014

My Mom Said My Password Was Important…

Well, I know I have been saying it for years, talking about it like it was one of the most...

Tracking Down Users with no Logon Script Configuration

ADManager Plus | June 20, 2014

Tracking Down Users with no Logon Script Configuration

​​When users are created in Active Directory, the logon script ​configuration often fails...

General | October 29, 2013

Taking Stock of Tor: Top 5 Tips for Using The Onion Router

The Silk Road and NSA spying may be old news, but The Onion Router (Tor) continues to...

General | October 22, 2013

Silk Road Raising Questions About Government Spying (Again)

It’s a case that’s captured everyone’s attention — pirates, drug trafficking, hit men,...

Page 9 of 11« First«...7891011»Last »