Security

NIST SP 800-179: Securing Apple OS X 10.10 Systems

  I noticed that NIST recently published the Draft Special Publication 800-179: Guide to Securing Apple OS X 10.10 Systems for IT Professionals. I’m looking forward to reading it. The public comment… Read more »

Ditching Adobe Flash on the Mac

  While I’ve kept Flash updated religiously over the years, last month I finally reached the point where the plugin was adversely impacting my Mac Pro’s performance. So I uninstalled… Read more »

iCloud Keychain vs. 1Password

  There are several password manager products available for the Mac and iOS. In this post, I’ll focus on iCloud Keychain (free) and 1Password 5 ($49.99 for the Mac app). There are other… Read more »

Little Snitch first impressions

I started using Little Snitch (version 3.5.1) a couple of weeks ago. It’s software firewall for the Mac, with a primary focus on outbound connections. This is also known as… Read more »

PingFederate Consulting

MacMaven Consulting offers PingFederate architecture, installation, and support services. In the first part of our SSO series, I explained what SSO is, and the special flavor of SSO called federation…. Read more »

SiteMinder Consulting

MacMaven Consulting offers SiteMinder architecture, installation, integration, development, and support services in the New York City area. Introduction to SSO Many large corporations have turned to off-the-shelf software for handling… Read more »

Secure email

  Generally speaking, sending an email over the internet is not secure. The message can be intercepted or even modified before it reaches the recipient. There are several technologies that… Read more »

Apple ID two-step verification

Apple recently added two-step verification to Apple IDs. This optional feature helps thwart hackers from using your Apple ID. This mechanism requires you to enter a four digit code after… Read more »

iCloud Data Security

iCloud is a fantastic service for synchronizing photos, documents, notes and more between your Macs and IOS devices. But before your personal data can be pushed to your devices, the… Read more »