10 Identity and Access Management Articles, September 2020

Identity Governance, Access Control, and Roadmapping headline this digest of Identity and Access Management articles.

identity and access management articles

Thanks for checking out this week’s digest of Identity and Access Management articles. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

 

10 Identity and Access Management Articles

 

Access Control For The Future Of Healthy Buildings via FacilityExecutive

Before the pandemic, access privileges were determined and managed based on security. Now, occupant health considerations are part of the access control equation.

 

IAM 101 Series: What Is Identity Governance and Administration? via Security Boulevard

With new data privacy and security regulations constantly emerging, organizations must now balance risk and customer experience while achieving regulatory compliance. Having the right identity governance and administration solution in place can play a crucial role in achieving this balance, keeping workforces productive, and enterprises secure.

 

Put Privileged Access Management at the Core of NIST Zero Trust Architecture via Security Boulevard

While there are several ways enterprises can get started with Zero Trust, strong privileged access management controls are essential to establishing NIST’s three core architectural components.

 

Reining In Cloud Spending? Try These 14 Smart Strategies via Forbes Tech Council

Cloud is an inherently more efficient operating model for data centers, but that is the tip of the iceberg of opportunity. Real cost savings come when we actively manage the cloud environment.

 

13 Effective Roadmapping Techniques Every Product Manager Should Know About via Forbes Tech Council

Conducting a periodic roadmap refresh is essential for concept validation throughout the project life cycle, and it will realign the plan to the latest priorities.

 

The Growing Threat of Business Email Compromise via Idenhaus

Over the past three years, Business Email Compromise (BEC) schemes have caused at least $5.3 billion in total losses.

 

Gartner: 7 traits of highly successful digital leaders via CIODive

Digital business transformation is often thought about in the context of organizational elements: changes to processes, facilities, policies and technology. However, effective leadership is one of the most fundamental and overlooked characteristics of a successful digital transformation.

 

Fraud feeds on weak digital identity verification via GCN

As citizens shifted from brick-and-mortar to online services in the wake of the pandemic, state and local governments agencies weren’t prepared for the increase in digital identities and new digital accounts – or the related fraud, an expert said.

 

Making Cybersecurity a Priority in the Boardroom via Infosecurity Magazine

The World Economic Forum (WEF) ranks cybersecurity amongst the top ten risks of immediate concern. The sad reality of it is that 40% of board members admit that cybersecurity isn’t a regular item on the agenda.

 

Is Your Identity Management Solution a Rube Goldberg Machine? via Idenhaus

IAM solutions can get unnecessarily complicated in a hurry. The ultimate IT goal is to deliver excellent solution quality and excellent value to the organization, which Idenhaus believes can exist together.

 

Check out our previous Identity Management digest, 13 Must-Read Identity Management and Cybersecurity Articles

 

 

To receive the top IAM and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top