[vc_row][vc_column][vc_column_text] Hackers Take Advantage of Poor Cyber Hygiene in Colonial Pipeline Company Attack The opening weeks of May 2021 saw cities throughout the southeast experiencing widespread fuel disruption. At one point, according to GasBuddy, a mind-blowing 71 percent of gas stations in North Carolina, 49 percent of gas stations in Georgia, and 55 percent of […]
What Is Unsolicited Login? Unsolicited login is the functionality where users access some part or feature of an application anonymously, but another part or feature requires them to login/authenticate before using those features. An Unsolicited Login Scenario For OAM Let’s assume that there’s an application ABC which we access using www.abc.com. By default, any user […]
[vc_row][vc_column][vc_column_text]One of the many exciting features of the Hitachi ID Identity and Access Management (IAM) Suite is the web services API which is accessible using SOAP over HTTPS with a WSDL specification. This API allows other enterprise applications to access workflow request queue, user data and resources that exist within an instance of the Hitachi […]
We’ve put together a short list of some best practices for unique login names. Users having a unique name is important for auditing and security. Define a method early on to help assure users are always unique across all systems and helps pinpoint any security and audit concerns quickly. Avoid recognizable naming standards. Such as […]