Identity and Access Management – The Cart or The Horse?

In my experiences with identity and access management (IAM) projects, there is always a moment when you begin having a “Are we putting the cart before the horse?” conversation.  This is particularly the case when you are, in parallel, having a conversation about how to “enable” IAM in the environment by either redesigning your current implementation of Windows Server Active Directory, creating...

Read More

Security Buzzwords – What’s the difference?

Data breaches are on the rise and experts forecast that that trend will continue (Experian – Data Breach Industry Forecast). With increased news coverage, Information security is no longer confined to the IT department.  Business partners and C-Level executives are now asking questions and want to know if their company is prepared.  …

Read More

Upcoming SQL Server 2016 Security Upgrades

Earlier this week Microsoft released the first public preview of SQL Server 2016 (CTP2).  There were a few new features that jumped out at me because I keep getting the same questions from healthcare clients around security and SQL Server and these features could solve some of the pain points they encounter (you can see the full list of new features in SQL Server 2016 in the SQL Server 2016...

Read More

Recent Healthcare Data Breaches Should Serve as a Call to Action

The trust behind the physician-patient relationship has always remained a cornerstone of patient care.  In order for a physician to make proper diagnoses and provide optimal treatment, the patient must feel comfortable providing all pertinent details about his or her condition.  The physician’s obligation to keep this information confidential is laid out in the code of medical ethics...

Read More

Using Good Dynamics SDK v1.8.x with Xamarin.iOS

After following  the “Getting Started” guide in the latest GOOD Dynamics documentation, you’ve undoubtedly encountered this error while trying to run your Xamarin.iOS application using GOOD Dynamics: This error has been a show stopper for most anyone attempting to get GOOD Dynamics working with Xamarin. Fortunately, the fix is fairly straightforward.…

Read More
Heartbleed bug exposes millions of online services to security risks

Heartbleed bug exposes millions of online services to security risks

This week, researchers from Codenomicon and Google Security publicly disclosed a critical bug in the OpenSSL cryptographic software package used by millions of internet connected services.  This weakness, referred to as the Heartbleed bug, allows anyone on the Internet to steal information from vulnerable systems by exploiting a protocol designed to ensure the security in network...

Read More

PCI – Don’t end up on the front page

Target announced today that hackers breached up to 40 million payment cards from its in-store point of sale (POS) systems, clouding the weekend before Christmas for a lot of people.  This unfortunate event should serve as a reminder of the criticality of customer data to all businesses that handle any type of debit or credit card data. …

Read More

Mobile Architecture Best Practices

When developing mobile apps, there are a number of key challenges where architecture and design are fundamentally different from that of a typical enterprise application. Careful consideration should be given to these mobile architecture issues early in the development process in order to mitigate the downstream impact of poor architectural decisions.…

Read More
Anti-Social Media

Anti-Social Media

The past week will likely go down in history as one where we saw the massive impact of social media in today’s world.  Most notably, following the horrible events in Boston, social media, especially Twitter, became a leading distributor of news information.  While a combination of bad reporting by the traditional news networks and tweets by ill-informed Twitter users often...

Read More

Mobile Security (Part 2)

Device security  Security at the mobile device layer is usually where the traditional IT security and administrative practices start to break down, and it becomes even trickier to uniformly implement when workers have essentially free reign to purchase and configure their devices as they choose.  As a result, a myriad of Mobile Device Management (MDM) suites have entered the market...

Read More

Mobile Security (Part 1)

​It won’t take an independent study or market research to convince most IT directors that mobile devices are now critical business assets. The “mobile workforce” long ago became the de facto workforce. For years, it seemed that the core issues affecting mobile security were device theft and company laptops being infected by malware on home networks and then being reconnected to a company’s...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons