Entries by PathMaker Group

Target Data Breach

How did they pull it off and how can you safeguard your environment from a similar event? The Target Stores data breach started by exploiting a vulnerability in an externally facing webserver.  Once inside, hackers took command of an internal server and planted malware on the Point of Sale devices in stores all over the […]

Have you had your Security Wellness Check?…

So you think your organization is secure . . . think again! IBM X-Force 2013 mid-year report says that many of the breaches recently reported were a result of “poorly applied security fundamentals and policies and could have been mitigated by putting some basic security hygiene into practice.” Covering the basics is exactly what we […]

Gartner Identity and Access Management Summit

How Can a Company Guarantee a Successful, Strategic Identity Access Management Program? The Gartner Identity and Access Management Summit is right around the corner and leaders from all over the world will be coming to try to get this question answered.  Here are a few ideas from our ten years in the industry. Strategic Identity […]

Mapping Manager DN in a Provisioning Policy

Below is a helpful little script that makes it possible for a provisioning policy (in this case AD) to map the correct DN for a manager: /*AD Manager*/ var adDN = ”; var myServiceDN = service.dn; var mySupvDN = subject.getProperty(‘manager’); if (mySupvDN != null && mySupvDN.length >0){ mySupvDN = mySupvDN[0]; var globalid = mySupvDN.substring(mySupvDN.indexOf(“=”)+1,mySupvDN.indexOf(“,”)); var […]

Application Security Webinar

 Presented By: Tony Vera, Senior Certified Security Specialist at IBM. Ryker Exum, Information Security Consultant at PathMaker Group Jason Bellomy, Manager of North American Sales for IBM’s Application Security Segment In this 50 minute webinar you will: Learn about the top security vulnerabilities that have yet to be addressed See common live hacking scenarios Hear […]

Security Framework

With so many aspects to consider for IT security, this framework is a very useful approach to analyze how well an organization is addressing overall IT security.  This framework breaks security into people, data, applications, and infrastructure. PEOPLE- The focus on people looks at controlling and monitoring what information people can and do access.  User […]

Discovering the TAC 202 Information Security Standard White Paper

The following is a snippet from the white paper titled Discovering the TAC 202 Information Security Standard. Please click the link below to access the full white paper now! Discovering the TAC 202 Information Security Standard White Paper “The TAC 202 is a freely available security standards framework that can be adapted and applied in many […]

7th Stage (Security) of IS growth, Part II

A little background: Now that you’ve been in the CIO’s position for your first quarter, it is time to prepare for your first review with the board of directors.  The agenda for the IS presentation will cover key factors that you discovered in your operations, your accomplishments and your plans for the next year.  Since […]