When securing enterprise systems every PeopleSoft customer knows they need strong passwords and secure networks. A good firewall is a critical first line of defense. But is your firewall as secure as you think? Ticketbleed, the latest network infrastructure vulnerability, was all over the news today. A quick internet search will turn up several valuable responses, but just for context, Ticketbleed, reminiscent of Heartbleed, is a vulnerability in the SSL/TLS layer of a wide variety of F5 firewalls and load balancers. Today’s news reminds us that even the best network and security infrastructure is vulnerable to compromise. Ticketbleed, Heartbleed, and other vulnerabilities make it very clear: network security infrastructure is not enough.
Oracle released an out of band security update today for issues within Oracle Weblogic Server. Recommendations are to apply the patch and mitigation steps as soon as possible. Read More.
After the PS_TOKEN threat vector was announced at Hack in the Box Amsterdam in May 2015, security organizations started adding specific tests for PS_TOKEN into their penetration test portfolio.
Why is identity management (IDM) such a challenging issue facing security personnel in today’s fast moving business environment? Security professionals are concerned with outside hackers, malicious insiders and accidental data loss. By not focusing on internal processes around their employees’ changing roles and responsibilities, organizations are missing a key area of risk.
A layered approach is critical to protect your PeopleSoft system against multiple threat vectors. Deploying a series of security barriers requires the bad guys to defeat all of them to breach the PeopleSoft system. A layered approached significantly reduces an organization’s daily risk, and their possible breach costs. Read More.
Your employees and constituents expect to be able to do everything on their mobile device that they would on their desktop without compromising functionality: finding a contact, applying for a job, reviewing their pay stub, enrolling in a class, enrolling in benefits, or make a payment.
Read on to see examples of true responsiveness in action.
Google’s perspective on its logo change is an interesting read. Check it out here.
CarolinaGo Mobile App Single Day Downloads Hit 2,000 after implementing CarolinaConnect. Read more
While some organizations believe hacks come from only external sources, these companies may be missing an even larger threat: internal, privileged users.