Stay informed with our biweekly Identity Management & Cybersecurity news digest. We curate the best IAM & Cyber security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are 5 informative and insightful IAM and cybersecurity articles from late September/early October 2018. Enjoy!
IAM deployments can be complicated, involving people, processes, and technology across the entire business. Join Idenhaus founder Hanno Ekdahl for an interactive and informative webinar on Friday, October 26, 2018, at 12 PM EST. He will provide expert insight on topics like:
-
How to conduct a successful assessment of your processes
-
Identifying process gaps and avoiding common pitfalls
-
Best practices in process alignment for a successful IAM deployment
Click here to register for our upcoming webinar Successfully Integrating HR Processes with Identity Management.
Prevent Identity Management Disaster with a Process Analysis via Idenhaus
For many organizations, the operational burden of managing IT systems on a day-to-day basis prevents the IT department from implementing highly strategic projects.
Almost Every Major Free VPN Service is a Glorified Data Farm via HackRead
In a recent study my organization conducted, analyzing the most popular free VPN services, we discovered that pretty much every popular free VPN service is a glorified data farm or abuse access to user’s data and resources in some form.
Turn the NIST Cybersecurity Framework into Reality: 5 Steps via DarkReading
Actionable advice for tailoring the National Institute of Standards and Technology’s security road map to your company’s business needs.
Agency leaders see identity, access tools essential to IT security, but lag on implementation via StateScoop
Only 28% of state government IT officials in the survey — and 15% at the local level — indicated that IAM solutions are fully or partially operational in their organization.
Successfully Integrating HR Processes with Identity Management [WEBINAR] via Idenhaus
Tension in the IT/Business relationship has fostered a good deal of mutual distrust, however, there is an opportunity with Identity Management to build a bridge to the business and deliver tangible value to the organization. Register now for the October 26th webinar!
Download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.
Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us