tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Current Articles | RSS Feed RSS Feed

How Virtualization Can Help with IT Security and User Authentication

it company virtualization

Network environments in business are changing on a constant basis, but the typical system to authenticate and verify users' identities tends to be inflexible.  Many packages that seek to deliver secure authentication assume that the environment is homogenous, which implies that it is unchanging as well.  Directory integration, however, can be streamlined and improved using virtualization technologies that go beyond the assumption that all systems are operating on an SSO (single sign on) basis. 

Google Warning Increases IT Security Awareness

Security Awareness

The need for robust IT solutions became ever more clear this week when none other than internet giant Google announced that it would be alerting specific users that their Gmail accounts may be become the target of determined hacking attacks.  Eric Grosse, speaking as Google's vice president in charge of security engineering, made the announcement on the firm's official security blog: "When we have specific intelligence, either directly from users or from our own monitoring efforts, we show clear warning signs and put in place extra roadblocks to thwart these bad actors." It is believed that the need for a warning has been prompted by an increasing level of hacking sponsored by foreign governments. 

Huge LinkedIn Breach Suggests Importance of IT Security

Importance of IT Consulting

The recent huge password breach at social media networking site LinkedIn provides an object lesson in the need for improved IT risk management.  After all, if a huge business such as LinkedIn can find itself with millions of users whose passwords may have been hacked, it only means that small and medium-sized businesses with access to fewer resources must be all the more diligent to use those resources to their maximum capacity.

In the case of LinkedIn, more than 6 million hashed passwords may have been breached, though the company has yet to issue any official numbers.  The networking site, intended and used primarily for individuals in professional fields, posted a blog entry revealing the problem, explaining that: "Members that have accounts associated with the compromised passwords will notice that their LinkedIn account password is no longer valid.  For security reasons, you should never change your password on any website by following a link in an e-mail."

Making Remote Access Easier with ID Management and Authentication

Remote Access with Cloud Computing

Remote access to business systems opens up huge potential in terms of efficiencies. With the ability to access a computer or network from a remote distance, many workers appreciate the flexibility that the modern workplace can offer.  On the other hand, however, this immense flexibility can also bring with it new challenges in terms of identification, authentication, and access management.

Cloud Challenges Require Excellent IT Support

Dual Authentication

The new era of cloud computing brings with it tremendous advantages in terms of scalability, cost savings, and employee efficiency, but it is not without its challenges.  One of the greatest challenges is the need for robust security.  In order for businesses and other organization to operate at their full capacity, the cloud solutions they employ must be appropriate for the threat environment as it currently exists, as it is likely to evolve in the near future.

Cyber Security: Obama Supports NIST Trusted Identities Project

Trusted Identities Project and Secure Web Transactions

Legislative gridlock and wrangling is nothing new, but one of the projects currently caught in a tug-of-war between Congress and the Executive Branch is an initiative known as the National Strategy for Trusted Identities in Cyberspace (NSTIC).  Funding in excess of $24 million, originally intended to help the National Institute of Standards and Technology (NIST) create an online system of trusted credentials to aid in the authentication of online identies during web transacations, is now in doubt. 

IT Solutions: Biometric authentication moving to cloud solutions


Researchers working for the National Institute of Standards and Technology have taken a huge step forward in the spread and implementation of biometric systems for user authentication.  These systems rely on information derived from the physical body of a user in order to verify his or her identity.  Common biometric markers include images of the iris of the eye, fingerprints, and facial imaging scans.  All of these physical markers are unique to most individuals on the planet.

IT consulting: Stay up-to-date on advanced authentication solutions

IT authentication

The issue of authentication has been a challenge for businesses for at least as long as computers have been an integral part of the workplace.  Newer technologies, however, are beginning to provide much more secure means of authentication than the typical user name/password combination or the use of a dongle or special card.  Text input, after all, can always be compromised and physical objects that a user must supply can be misappropriated or misused.

New Worm Threat Raises Awareness of Managed Programs


Employees often want to visit social media sites such as Facebook on their breaks or lunch hours, or even during working hours, although many company policies prohibit such access.  It can be difficult for companies to lock down such sites, however, because all too often, firms are making valuable business use of social media.  These factors complicate life when malware programs such as the Ramnit worm begin to target those who log onto Facebook.

NIST Authentication Guidelines Recognize Managed Services Model


Business organizations should be aware of the revised guidelines that have emerged from the National Institutes of Standards and Technology regarding electronic authentication methods.  Special publication 800-63-1 explains how both government agencies and private entities such as business can use web-based technologies for verifying the identity of the people who use their networks and systems.  This publication is an update of the 2006 guidelines and reflects how the information technology world has evolved over the course of the past five years. 

All Posts