Skip to content
  • TechnologEase LLC

Chris Olive

CyberSecurity Strategist | Advisor | Evangelist | Consultant | Hands-On Technologist | Human Router

  • RSS Feed
  • Twitter
  • LinkedIn
  • Mail
  • Blog
  • About Me
  • Recipes
  • Blog
  • About Me
  • Recipes
The (Immediate) Future of Ransomware

The (Immediate) Future of Ransomware

Chris Oliveby Chris OliveApril 26, 2016April 11, 2023

In keeping with the fact individuals and enterprises are seeing and experiencing a lot more occurrences of ransomware, I’m also seeing a lot of articles …

The (Immediate) Future of Ransomware Read More
The Case for “Encrypt Everything”

The Case for “Encrypt Everything”

Chris Oliveby Chris OliveApril 13, 2016April 11, 2023

Within the IT industry, when considering data-at-rest (DAR) encryption, you may have noticed recently that security experts seem a little divided on how to leverage …

The Case for “Encrypt Everything” Read More
The Problem of Non-Human IDs in Organizations Today

The Problem of Non-Human IDs in Organizations Today

Chris Oliveby Chris OliveFebruary 4, 2016December 16, 2024

The contents of this article are captured here and reflected back in response to an article posted on SailPoint’s Identity Quotient Blog article entitled “Third-Party …

The Problem of Non-Human IDs in Organizations Today Read More
History Demonstrates Strong Encryption Is Here To Stay

History Demonstrates Strong Encryption Is Here To Stay

Chris Oliveby Chris OliveJanuary 15, 2016July 21, 2023

(Originally published on LinkedIn – January 13th, 2016) I am a firm believer that knowing the background and history of things provides a much better …

History Demonstrates Strong Encryption Is Here To Stay Read More
Considerations Around Application Encryption

Considerations Around Application Encryption

Chris Oliveby Chris OliveDecember 22, 2015April 12, 2023

For years, the use of encryption to protect data-at-rest on computers within the enterprise was solely the responsibility of developers who coded the applications that …

Considerations Around Application Encryption Read More
Two Years Later: Reflections from “The Breach”

Two Years Later: Reflections from “The Breach”

Chris Oliveby Chris OliveNovember 6, 2015April 12, 2023

President and CEO of Vormetric, Alan Kessler, blogged earlier this week concerning the far-reaching impacts of the Target breach – reflections from almost two years …

Two Years Later: Reflections from “The Breach” Read More
History Foretells the Raising of the Ante: Securing Your Data Now All but Mandatory

History Foretells the Raising of the Ante: Securing Your Data Now All but Mandatory

Chris Oliveby Chris OliveAugust 31, 2015April 14, 2023

It’s been said that those who don’t learn from history are doomed to repeat it. In my last article, I wrote metaphorically about the medieval …

History Foretells the Raising of the Ante: Securing Your Data Now All but Mandatory Read More
Data Is The New Gold: Getting Data Security Right in Retail

Data Is The New Gold: Getting Data Security Right in Retail

Chris Oliveby Chris OliveAugust 28, 2015April 13, 2023

Traditional security has always been metaphorically tied to the medieval castle building of old: building thicker walls and drawbridges, creating multiple perimeters, raising larger armies, …

Data Is The New Gold: Getting Data Security Right in Retail Read More
SailPoint IIQ: Rule Modeling in Real Java :-)

SailPoint IIQ: Rule Modeling in Real Java :-)

Chris Oliveby Chris OliveApril 24, 2014April 25, 2023

I’ve been sitting on this article and concept for months and have had others ask me about it via email — whether I’ve ever done …

SailPoint IIQ: Rule Modeling in Real Java :-) Read More
Stupid Sailpoint Developer Tricks

Stupid Sailpoint Developer Tricks

Chris Oliveby Chris OliveJuly 11, 2013April 14, 2023

G’day, mates — as they say Down Under, where I happen to be at the moment on a rather large SailPoint engagement. It’s been a …

Stupid Sailpoint Developer Tricks Read More

Posts pagination

Previous 1 2 3 Next

Highlighted Content

A whitepaper written in 2020 and still relevant today. Updates made in 2023 to modernize. The issues around ATOs using credentials and misunderstandings about stopping these ATOs unfortunately persist.

Recent Posts

  • Test Strategy for Proxmox Production Home Lab
  • Running a Unifi Network Controller in a Proxmox LXC Container
  • Identity Management, 9/11 & Remembrance in Action
  • Can You Trust a Third-Party User? No, But You Can Manage Their Lifecycle Access
  • Why IAM Is Insufficient for Data-Centric Security

Categories

  • Breaches
  • Cloud/SaaS
  • Core Security
  • CyberSecurity Landscape
  • Data Science
  • Data Security
  • Development
  • Engineering Notebook
  • Home Lab
  • Identity Security
  • Networking
  • Products
  • Society/Government
  • Tooling

Recipes

  • Bulk Download All Proxmox LXC Templates via PVE Command Line
  • Mounting Proxmox Raw Images in Any Linux
  • Proxmox IPTables Port 8006 Redirect to Port 443
  • Cloning/Restoring a Proxmox LXC Container from Backup
  • Installing Certificate for Self-Hosted Unifi Network Controller

Tag Cloud

Access Access Controls Aggregation Backups BeanShell Breaches BuildMap CISO Cloud Code Compliance Dark Web Data Data-Centric Data Security Development Encryption Government Hacking Historical Lens IAM Identities Identity Governance IdentityIQ Identity Management Identity Security Java Key Management Metadata Networking Non-Human IDs NUIDs People Privileged Access Privileged Data Process & Technology Ransomware Risk Risk Management Rules SailPoint Sensitive Data Strategy Target Tooling

Copyright © 1996-2023, Chris Olive :: All rights reserved Powered by WordPress and Bam.