Evolveum: IT security threats in 2018

IT security threats in 2018: are you ready for them?

2017 was a really great year. For hackers. Many of us heard about WannaCry and NotPetya that took down over 300,000 computers across the world, including the UK’s National Health Service or government agencies in Ukraine. CCleaner, a utility program millions of Windows users rely on to clear potentially unwanted files off their PCs, got hit by a malware. The installer was patched to remove the malware, but only after over 700,000 machines were already infected. […]

Evolveum - Data Privacy Day 2018

How to stay safe online: tips and advice

We live in a fast evolving world. We surround ourselves with the technology to make our life easier every day. While in the past it would cause a great amusement, today we don’t even blink an eye when seeing someone hanging on their device, being online at any place, any time. The Internet became a Read more about How to stay safe online: tips and advice[…]

Evolveum - Noris and training courses

2017 – The Year of midPoint Training Courses

This year (2017) was full of training courses. Literally, there was almost no month without any training. Some took place in our office in Bratislava, Slovakia, some were remote/online sessions, but most of them were onsite, which meant a lot of travelling. I travelled to Canada and United States, later also to Finland. I experienced my first transatlantic flight, Read more about 2017 – The Year of midPoint Training Courses[…]

Evolveum open source pledge

Our names are Igor Farinič and Radovan Semančík. Although you might have noticed our names you are probably not aware that we are the founders of Evolveum. Evolveum is not based on venture capital investments and therefore the control of the company is firmly in our hands. And now we would like to very clearly express our commitment to the open source approach. Evolveum was, is and always will be an open source company. […]

How to protect your privacy online

By 2020, more than 30.7 billion devices will be connected to the Internet. On one hand, that gives people access to information all over the world as well as an opportunity to electronize the processes and let the workflow be more efficient. On the other hand, there is a big risk of identity theft, fraud, Read more about How to protect your privacy online[…]

There is No Security without Identity Management

It isn’t. That’s how it is. Why? Take any study describing potential information security threats. What do you see among the top threats there? Take another study. What do you see there? Yes. That’s the one. It is consistently marked as one of the most serious threats in vast majority of studies published for (at least) last couple of decades. Yet it looks like nobody really knows what to do about this threat. So, who is this supervillain? He’s right under your nose. It is the insider. […]

OpenLDAP Management: slapdconf

I like OpenLDAP. OpenLDAP server is famous for its speed and good open source character. But it is really infamous for ease of management. Or rather a lack of anything that could be called “easy” when it comes to managing OpenLDAP. Managing OpenLDAP content is not that difficult. For manual management there is excellent Apache Read more about OpenLDAP Management: slapdconf[…]

FOSDEM 2016 and my first talk?

On Monday, I travelled back home from FOSDEM Conference which I was attending for the second time. Last year I was only an attendee enjoying the atmosphere made by all these open-source positive people, but this year I decided to move further and try to apply for a talk. When I was sending a proposal Read more about FOSDEM 2016 and my first talk?[…]

MidPoint Deployment Workshop Challenge

During the last weeks of 2015, the Evolveum team was partially “distributed” around the Europe. There were multiple conferences and similar public events and also two midPoint workshops led by me, in Switzerland and Germany. I used to lead a lot of trainings and workshops in Evolveum and also before, but the workshops are usually more challenging, especially when they are organized for the partners, not the end customers. The partners usually already have experience with different products and try to match the features during the courses. Their expectations are both specific to a project and also abstract – conceptual. MidPoint deployment workshop can be very effective way how to boost your midPoint knowledge in a couple of days.

[…]