Stay informed by receiving our biweekly Identity Management & Cybersecurity digest in your inbox. We curate high quality and relevant IAM & Cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are the top Cybersecurity and Access Management articles from September 2017. Enjoy!
Digital transformation: how boards can weather the storm via BoardAgenda
Digitalisation is a challenging reality for boards, which are about to navigate what may be the most challenging weathers faced to date.
45 Things You Should Know About Blockchain via Brian Colwell
Blockchain has been one of the most awe-inspiring innovations since the Internet came into existence.
The massive scope of the Equifax data breach is almost as horrifying as the confidential personal data that was exposed.
To defend against the threats, some agencies are moving away from department-based, stove-piped systems toward identity and access management.
What is NoOps and Is It Real? via caTechnologies
Is NoOps the logical conclusion of DevOps and what does this mean for software development and IT operations?
Governance frameworks are necessary to deliver on the promise of IAM to support business users’ access needs consistently.
Identity data in the world of GDPR via CSOOnline
CIAM systems can be configured to help to get your organization within the compliance zone of GDPR and other privacy-based regulations.
The MFA concept is fairly straightforward; however, the challenge is getting all your users’ phone numbers collected and making sure they are accurate.
Privileged Access Management & Equifax: 5 Deadly Sins via CreditUnionTimes
The veiled cause for many breaches making headlines, according to cybersecurity insiders, is misuse and abuse of privileged accounts.
Equifax: America’s In-Credible Insecurity – Part One via ICIT
A catastrophic breach of Equifax’s systems was inevitable because of systemic organizational disregard for cybersecurity and cyber-hygiene best practices, as well as Equifax’s reliance on unqualified executives for information security.
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us