Tags » Enterprise IT

Oh, boo hoo. CISOs get no respect from their C-suite peers

What is it about the schadenfreude that infects the hallowed executive suite?

According to new research by ThreatTrack Security, a whopping 74 percent of 203 C-level bigwigs surveyed said that Chief Information Security Officers (CISOs) should not get a seat at the big-boy table. 297 more words

Enterprise IT

How new data created new products in the second-quarter 2014

Enterprises have overwhelmingly committed to accelerating their transition to new technologies, with the goal in mind to free up IT investment dollars in order to create more strategic business-changing applications and to have more agility in implementing ongoing change.

Table of Contents

Got a BYOD Problem? Blame the Millennials You Just Hired.

If your company’s IT department is having any troubles wrestling with the “bring your own device,” or BYOD, trend, here is a handy new hook on which to hang the blame: The young people you just hired. 422 more words


PartialResultException when retrieving attribtues from MS AD using Java JNDI

Had a weird PartialResultException thrown on retrieving additional returned attributes from AD. Then it would go into referral mode and fail at DNS issues (latter was environment specific). 39 more words

Information Technology

Speedup WebLogic Startup Performance

To speed up WebLogic server startup you can disable the random number generator security feature.

You have two options:
1) Set below system variable in server startup script: 35 more words

Information Technology

OIM 11gR2 - Process triggers sending out older values

Recently I came across an issue of the process triggers (Lookup.USR.PROCESS_TRIGGERS) sending out the older value to my target. The attribute in question here was something I was setting in my post-process event handler. 284 more words

Information Technology

Resolving WebLogic Vulnerabilities

 NodeManager Vulnerabilities

  • SSL Server Allows Anonymous Authentication Vulnerability
  • SSL Server Has SSLv2 Enabled Vulnerability
  • SSL Server Supports Weak Encryption Vulnerability
  • Web Server Uses Plain-Text Form Based Authentication…
  • 701 more words
Information Technology