The Recent OPM Systems Breach: Security Needs to be a Priority

It seems that not a month goes by without a new report of a massive breach that has compromised millions of records.

The recent breach of US OPM systems is just another example, it seems, of the poor governance and practices that are endemic to too many enterprises. Administrators credentials, with the privilege to do anything on a computer system, and the ability to view (or even manipulate) any of the stored data, seem to have been the cause.

Continue reading

MEDJACK Attacks: Who is the Problem; What, Where, When & How is the Solution

In recent security report, case studies have shown most health organizations are vulnerable – if not already a victim of a MEDJACK attack, otherwise known as a “medical device hijack.”

Here is how it works: The main networks of a hospital or healthcare facility are initially exploited when hackers break into unpatched and outdated devices, like blood gas analyzer or X-ray scanner. The attackers then proceed to build their backdoors into systems using such devices that are also connected to the Internet.

Continue reading

Fox Technologies Sponsors Red Hat Summit 2015 with Raspberry Pi Giveaways

Fox Technologies gears up to promote security and efficiency at Red Hat Summit 2015 with its “Get inside the BoKS” promotion. Visitors will have the chance to win a Raspberry Pi.

GRAND RAPIDS, MI – Tuesday, May 19, 2015 – Fox Technologies, Inc., a portfolio company of Parallax Capital Partners, today announced its sponsorship at Red Hat Summit 2015. Located at booth #218, Fox Technologies will showcase its new release of BoKS ServerControl 7.0, a comprehensive identity and access management solution for UNIX and Linux platforms. Red Hat attendees who visit the Fox Technologies booth will have the opportunity to win a Raspberry Pi every 30 minutes.

Continue reading

August 17 – 19, 2015 – LinuxCon & CloudOpen North America

REGISTER: LinuxCon & CloudOpen North America

Overview

LinuxCon is the place to learn from the best and the brightest, delivering content from the leading maintainers, developers and project leads in the Linux community and from around the world. There’s simply no other event in North America where developers, sys admins, architects and all types and levels of technical talent gather together under one roof for education, collaboration and problem-solving to further the Linux platform.

Continue reading

October 5 – 7, 2015 – LinuxCon & CloudOpen Europe

REGISTER: LinuxCon & CloudOpen Europe

Overview

LinuxCon is the place to learn from the best and the brightest, delivering content from the leading maintainers, developers and project leads in the Linux community and from around the world. There’s simply no other event in Europe where developers, sys admins, architects and all types and levels of technical talent gather together under one roof for education, collaboration and problem-solving to further the Linux platform.

Continue reading

PIM, PAM and PUM: Best Practices for Unix/Linux Privileged Identity and Access Management

system security, access management, identity access management, foxtOverview

PIM, PAM and PUM have different meanings, and interpretations, to different people. For the most part the concepts around these three far-ranging topics intersect, and for the most part we are talking about the same thing. PIM, privileged identity management; PUM, privileged user management; and PAM, privileged account management OR privileged access management.
Continue reading