Skip to main content
Home
Our ContributorsAbout
 
  • App Dev & Testing

    Get up to speed fast on the techniques behind successful enterprise application development, QA testing and software delivery from leading practitioners.

    View all   
    Four skeleton keys
    Unlock appeal

    Retain to attract: 4 key tips to develop the developers

    Person sketching on paper
    Sketching a game plan

    How to make low code work long term

    Rear view of model of Back to the Future De Loren car
    Back to the future

    Revisiting '13 programming languages for the future'

    Vintage street maps
    Charting course

    Developing your application modernization road map

    Car engine bay
    Performance tuning?

    Data engines: What's under your hood?

  • Enterprise IT

    Trends and best practices for provisioning, deploying, monitoring and managing enterprise IT systems. Understand challenges and best practices for ITOM, hybrid IT, ITSM and more.

    View all   
    A set of illuminated letters spelling out Code Happy
    Developers build on legacy

    Why programmers still love COBOL

    Geometric world map wall art in Benjamin Espresso Bar, Kiev, Ukraine
    Journey planning

    There is no map for digital transformation

    Man in red t-shirt walking a highline at Taft Point, Yosemite.
    No two high-wire walks are alike

    Digital transformation: A balancing act

    Bank station, on London underground, signage on platform
    Banking on platformification...

    Embedded finance platforms unlocking opportunity

    Red and white sign displayed at Snowmass, near Aspen, Colorado, warning of potentailly deadly concequences of going further.
    Decision point

    6 data-driven diagnoses for the digital dilemma

  • Security

    All things security for software engineering, DevOps, and IT Ops teams. Stay out front on application security, information security and data security.

    View all   
    Dart in the red bullseye on green and wite concentric circled dart board
    Hit the bull's-eye

    10 women in cybersecurity predict software security trends

    A sassy child in black fairfax sweatshirt and red sun glasses
    SaaS-y, but still classy?

    Why your SaaS configurations are putting you at risk

    Unlocked padlock securing a latch on a yellow door
    Addressing insecurities

    3 methods to provide security while scaling AppDev

    Burning steel wool being swirled in a circle at night to form a zero with slow exposure
    Zero hero?

    Rising zero-click risks and how to defend your business

    Marshall amplifer
    Risk amped to 11

    Embrace data protection throughout your company’s lifecycle

  • GUIDES

    TechBeacon Guides are collections of stories on topics relevant to technology practitioners.

    View all   
    The future is security as code. Find...

    TechBeacon Guide: DevSecOps and Security as Code

    It can be challenging to operate and...

    TechBeacon Guide: SecOps Tooling

    Software quality is a top priority,...

    TechBeacon Guide: World Quality Report 2021-22

    Based on responses from over 500...

    TechBeacon Guide: The State of SecOps 2021

    Modern app design and DevSecOps...

    TechBeacon Guide: Application Security Testing

  • CONFERENCES

    Discover and register for the best 2021 tech conferences and webinars for app dev & testing, DevOps, enterprise IT and security.

    View all   
    Managing your IT assets in hybrid,...

    Webinar: Maximizing Your IT Assets

    Do you want the freedom that...

    Webinar: Get a Fast Pass to Full-Stack AIOps

    As organizations migrate to the cloud...

    Webinar: Access Mainframes Securely from the Cloud

    In the wake of the pandemic,...

    Webinar: Best Practices to Protect Data in the Cloud

    Fireside chatAs indicated in the most...

    Webinar: Threat Hunting—Stories from the Trenches

Subscribe
Home
  • Our Contributors
  • About
Subscribe
  • App Dev & Testing
  • Enterprise IT
  • Security
  • Guides
  • Conferences
  • Our Contributors
  • About
Subscribe
Guides
Conferences

About Danny Kim

Danny Kim
Founder and CTO
FullArmor
1 article

Danny Kim is the CTO and a founding member of FullArmor Corp. Danny is a recognized industry expert on Security, Directory based services, Datacenter automation, and Cloud based computing. Danny has helped more than 30 Fortune 100 companies, including Bank of America, Boeing, and Wal-Mart, design and deploy their security policies, Datacenter automation, and Cloud based infrastructures. He has also architected and developed several leading Windows policy management and virtualization products which have been licensed by Microsoft, NetIQ, Citrix, HP, Sony, Toshiba and others.  Danny holds a BS in Computer Science from Cornell University.

  • Recent
  • Popular
Envision a single administrative console, one audit report for compliance, and a centralized enforcement. Extending Active Directory is key.
Danny Kim
May 31, 2019
Extend your Active Directory security policy to Linux and beyond
Identity and access management rescripted

Subscribe to TechBeacon

Get the best of TechBeacon, from App Dev & Testing to Security, delivered weekly.

SUBSCRIBE
Show More

Home

Brought to you by
HP

Topics

  • App Dev & Testing
  • Enterprise IT
  • Security
  • GUIDES
  • CONFERENCES

TechBeacon

  • About
  • Our Contributors
  • Terms of Use
  • Privacy
Cookie Privacy Manager

Subscribe to TechBeacon

Get the latest delivered straight to your inbox.

What topics interest you?

I'd like to receive emails from TechBeacon and Micro Focus to stay up-to-date on products, services, education, research, news, events, and promotions.

Sign up

Thanks for subscribing!

Check your email for the latest from TechBeacon.

© Copyright 2015 – 2022 Micro Focus or one of its affiliates
Back to top