Identity and Access in Higher Education: Effective Management of Multi-Role Users
Frequently changing user roles are a significant challenge for higher education organizations. In this webinar recording you’ll learn how you can improve your security posture and reduce help desk costs using systems frequently deployed in HE. Read more…
Integrating AD and Azure AD: How to Satisfy User Expectations AND Stay Secure
Technologies such as Azure AD Connect, MIM, and Saviynt enable organizations to implement effective, integrated, and secure access controls across cloud and on-premises assets, and build a quality end-user experience – learn more at our webinar. Read more…
Enable Multi-Factor Authentication – But Choose Your Options Wisely!
We all know the importance of enabling two-factor or multi-factor authentication to secure our personal and business identities. But not all MFA verification options are created equal. Read more…
What you need to know about the latest MIM 2016 SP1 hotfix (4.5.26.0)
Microsoft has released a MIM 2016 SP1 hotfix (4.5.26.0) that improves security, adds language definitions, logging enhancements, and a change to the way Boolean attributes are handled by the MIM Service. Read more…
Moving Beyond Passwords
With new authentication standards like WebAuth becoming widely adopted, and hardware manufacturers adding more biometric capabilities into their devices, the password could soon be heading for obsolescence. Read more…
Integrating Cerner into Your Enterprise Identity Infrastructure
The data stored in the Cerner app represents the crown jewels for healthcare organizations, and inappropriate use of the data represents a significant risk in the form of regulatory fines, damaged reputation and high costs of mitigating the damage to customers with compromised credentials. Read more…
The Death of the Password?
The password has been a ubiquitous part of our daily lives for decades now. But are passwords still relevant for securing our information? Where is information security and authentication headed? Read more…
New Security Features in Office 365 Threat Intelligence
Microsoft Office 365 Threat Intelligence gives security teams the insights and tools needed to combat the tactics used by today’s threat actors. Read more…
Are Your Privileged Identities Causing a Security Risk?
All identities are of interest to cyber criminals, but privileged identities are an especially high-value target because of their “super-user” access. Is your organization doing enough to keep these privileged identities safe from attackers? Read more…
Oxford Computer Group Partners with Lieberman Software to Deliver Cyber Defense Solutions to Customers
Oxford Computer Group LLC and Lieberman Software are pleased to announce a strategic partnership to offer deeper Cybersecurity and Identity Management services for Microsoft customers. Read more…