Did you miss yesterday’s newsletter?
Stay informed with the Idenhaus biweekly Identity Management & Cybersecurity digest. We curate the best IAM, IGA, IDM, IoT, & infosec articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are our favorite Access Management & Cybersecurity articles for February 2018.
The biggest misconception about GDPR is whether you can control data under the regulation – and whether you should. In fact, 80% of GDPR is out of the CISO’s control.
Cybersecurity 2018: Three Issues to Address via DataCenter Journal
Given the volume and variety of threats in today’s network, IT security teams are often hard-pressed to determine priorities.
We recently attended the Sailpoint partner conference (#SailPointSKO18) in Dallas, TX and, as sales and technical training events go, it was very worthwhile.
The Report identifies possible gaps in standards; for example, the application of blockchain in cryptographic techniques, the inability to use software patches to fix flaws in cyber incident management.
To successfully drive product selection and deliver the full value of an Identity Management solution, we recommend developing a decision framework, or scorecard, that combines investments in people and IT capabilities.
Also, be sure to download my new, FREE digital book entitled How To Design, Choose And Implement The Right IAM Solution For Your Business.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us