Remove author sue-poremba
article thumbnail

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

Yet, most breaches today can be traced back to a compromised identity, or misuse of an authorized identity. Thus, continually assuring the validity of authorized users has now taken center stage. With each identity comes certain entitlements and authorizations, which need to be monitored and governed. Compliance matters.

article thumbnail

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

The Last Watchdog

It’s an authority that states don’t have. Last Watchdog’s Sue Poremba contributed to this article. Finally, state and local governments don’t have the resources the federal government does. The FBI and intelligence agencies have capabilities to determine who the bad actors are, what they are doing and how to retaliate.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

Once you know what you have you,” Dooley continued, “you need to do a deeper level of inspection to understand if authentication, authorization, availability, and encryption are working as it is supposed to.” Access to sensitive systems and data should always require high levels of authorization and authentication, Dwivedi told me.

article thumbnail

MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

The Last Watchdog

Employees are given credentials that allow them authorized access to corporate networks and databases. Active directory provides two key networking enablers to an organization: authentication, or the ability to log on to gain access to business systems, and authorize specific tiers of access. Key takeaways: Networking enabler.