Skip to content
  • TechnologEase LLC

Chris Olive

CyberSecurity Strategist | Advisor | Evangelist | Consultant | Hands-On Technologist | Human Router

  • RSS Feed
  • Twitter
  • LinkedIn
  • Mail
  • Blog
  • About Me
  • Recipes
  • Blog
  • About Me
  • Recipes

Tag: Aggregation

SailPoint IIQ: Rule Modeling in Real Java :-)

SailPoint IIQ: Rule Modeling in Real Java :-)

Chris Oliveby Chris OliveApril 24, 2014April 25, 2023

I’ve been sitting on this article and concept for months and have had others ask me about it via email — whether I’ve ever done …

SailPoint IIQ: Rule Modeling in Real Java :-) Read More
Stupid Sailpoint Developer Tricks

Stupid Sailpoint Developer Tricks

Chris Oliveby Chris OliveJuly 11, 2013April 14, 2023

G’day, mates — as they say Down Under, where I happen to be at the moment on a rather large SailPoint engagement. It’s been a …

Stupid Sailpoint Developer Tricks Read More
SailPoint IdentityIQ: The Build Map Rule Revisited

SailPoint IdentityIQ: The Build Map Rule Revisited

Chris Oliveby Chris OliveNovember 28, 2012April 18, 2023

(Not covered at the time this article was written is… The following information pretty much covers the JDBC Build Map rule and the SAP Build …

SailPoint IdentityIQ: The Build Map Rule Revisited Read More
SailPoint IdentityIQ: Rule and Settings Overrides

SailPoint IdentityIQ: Rule and Settings Overrides

Chris Oliveby Chris OliveJanuary 18, 2012April 18, 2023

One of the primary reasons I write here is to clear up any minor points of confusion with our highly valued Qubera customers, and to …

SailPoint IdentityIQ: Rule and Settings Overrides Read More

Highlighted Content

A whitepaper written in 2020 and still relevant today. Updates made in 2023 to modernize. The issues around ATOs using credentials and misunderstandings about stopping these ATOs unfortunately persist.

Recent Posts

  • Test Strategy for Proxmox Production Home Lab
  • Running a Unifi Network Controller in a Proxmox LXC Container
  • Identity Management, 9/11 & Remembrance in Action
  • Can You Trust a Third-Party User? No, But You Can Manage Their Lifecycle Access
  • Why IAM Is Insufficient for Data-Centric Security

Categories

  • Breaches
  • Cloud/SaaS
  • Core Security
  • CyberSecurity Landscape
  • Data Science
  • Data Security
  • Development
  • Engineering Notebook
  • Home Lab
  • Identity Security
  • Networking
  • Products
  • Society/Government
  • Tooling

Recipes

  • Bulk Download All Proxmox LXC Templates via PVE Command Line
  • Mounting Proxmox Raw Images in Any Linux
  • Proxmox IPTables Port 8006 Redirect to Port 443
  • Cloning/Restoring a Proxmox LXC Container from Backup
  • Installing Certificate for Self-Hosted Unifi Network Controller

Tag Cloud

Access Access Controls Aggregation Backups BeanShell Breaches BuildMap CISO Cloud Code Compliance Dark Web Data Data-Centric Data Security Development Encryption Government Hacking Historical Lens IAM Identities Identity Governance IdentityIQ Identity Management Identity Security Java Key Management Metadata Networking Non-Human IDs NUIDs People Privileged Access Privileged Data Process & Technology Ransomware Risk Risk Management Rules SailPoint Sensitive Data Strategy Target Tooling

Copyright © 1996-2023, Chris Olive :: All rights reserved Powered by WordPress and Bam.