1900 Avenue of the Stars
Los Angeles, CA 90067
- Oracle Partner Video
Philip Lieberman Discusses how Lieberman Software and Oracle are Working Together to Secure Large Enterprise Environments in this 2:44 video.
- We have implemented a number of Technology Integrations over the past few months. Want to know more? Visit our Technology Integrations site!
Product Updates / Launches / Podcasts
- Whitepaper: Who Holds the Keys to Your IT Kingdom? This guide examines four key steps necessary to secure an organization's privileged identities. It describes basic, manual and ad-hoc processes that can improve control over privileged access along with automated alternatives to further reduce the risks of data breaches and operational disruptions while improving staff efficiency and management oversight.
Events / Press / Analysts
- Did you know? You can now follow us on Twitter!
- Los Angeles Times, February 2010: French judge issues arrest warrant for cyclist Floyd Landis in alleged hacking incident. Lieberman said he would like to ask the lab who had access to the system. "An interesting question about this," he said, "is - was there a third party involved that had authorization to get through the firewall to see results and shared that account?"
- Network World, February 2010: Credit card data security: Who's responsible? In this article, Philip Lieberman argues that last year's data breach at Heartland was less the fault of the company's, and more the result of the lack of smart card technology that credit card issuers refuse to issue in the United States.
- Redmond Magazine, February 2010: Microsoft Reports Bug in Web Security Protocols. "This type of bug/limitation is not particularly surprising given that this type of exploit requires that a hacker have a very high technical capability as well as the ability to tap into secure network sessions," Lieberman said. "It is an interesting technical exploit, but not particularly likely."
- Dark Reading, February 2010: Database Account-Provisioning Errors A Major Cause Of Breaches. "They have to ask themselves the question, 'Where do we have accounts? Tell me all of the places where we have accounts and tell me all the things they use these accounts for?'" says Phil Lieberman of Lieberman Software, which specializes in privileged user management.