Active Directory and LDAP Security
- May 05, 2015
Microsoft has released its Local Administrator Password Solution for a common admin login account across all domain-joined computers in hopes that it will decrease pass-the-hash attacks.
- July 15, 2014
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.
- October 25, 2013
The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.
- February 08, 2008
Analyst Mark Diodati describes the leaders of the identity management market; IBM's Joe Anthony explains Big Blue's strategy and Novell's Dale Olds on user-centric identity.
- December 12, 2007
Big Blue is melding automated features from its lightweight Express version in what it says should simplify deployments and ease end user pain.
- November 14, 2007
While most firms are pleased with the results of their identity management implementation, they faced many initial hurdles.
- November 13, 2007
To better serve customers preoccupied with regulatory compliance and identity management, Sun has agreed to acquire enterprise role-management vendor Vaau.
- September 13, 2007
IBM has been on a shopping spree over the last several years to beef up its Tivoli identity and access management suite. Over the summer, Big Blue rolled out the results of its acquisition with Consul Risk Management, launching the Tivoli Compliance...
- March 09, 2007
Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing.
- September 28, 2006
Whether you view the security of Active Directory as a matter of defense or of improving its configuration management, it's a system that must be protected.
- September 06, 2006
Centrify's DirectControl Suite gives organizations the benefits of SSO and centralized policy management for Windows and *nix platforms with minimal hassle and good results.
- June 29, 2006
Many IT shops use Microsoft Active Directory to manage network access. Some say it's difficult, but others use it to successfully handle directory services, group policy and provisioning.
- November 02, 2005
Registry-based Group Policy settings in Microsoft Windows can serve as a secret weapon for administrators looking to restrict functionality or enforce specific configurations for computer systems on the network. Consultant and author Tony Bradley ...
- October 10, 2005
Versions of Sun's Java System Directory Server are vulnerable to an unspecified error in the HTTP admin interface that could expose data to unauthorized users.
- July 11, 2005
Last week IBM announced its new Data Governance Council, formalizing a group of enterprises and IT organizations that have been meeting quarterly for more than a year to discuss ways of better protecting data against online thieves. Council ...