6 Informative Identity Management & Cybersecurity Articles, May 2018

Stay abreast of the latest industry news, cyber attacks, and Identity Management thinking with the Idenhaus Identity & Access Management digest. We curate the best IAM/IDM, IoT, Identity Governance/Federation, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

Here are 6 informative cybersecurity articles from early May 2018. Enjoy!

A smooth transition to the cloud is possible with identity governance via HelpNetSecurity

While migrating part or all of your IT infrastructure to the cloud can seem like an intimidating and time-consuming endeavor, here are a few best practices that will help you in your journey.

12 Trends Shaping Identity Management via DarkReading

As IAM companies try to stretch ‘identity context’ into all points of the cybersecurity market, identity is becoming ‘its own solar system.’

Is Your Identity Management Solution a Rube Goldberg Machine? via Idenhaus

Like many IT projects, Identity Management is rife with opportunities to over-complicate the solution and formulate extremely complex designs that include all imaginable use cases and a broad range of exceptions.

Alexa and Siri Can Hear This Hidden Command. You Can’t. via NYTimes

In the wrong hands, the technology could be used to unlock doors, wire money or buy stuff online ­– simply with music playing over the radio.

The Alternate Truths of Identity Management via VirtualStrategy

One of the things I often hear from customers who are in the middle of an identity project, or just finished one, is that they didn’t involve the business early enough.

Avoid this Crippling Multi-Factor Authentication Security Mistake via Idenhaus

The challenge is getting all your users’ phone numbers collected and making sure they are accurate. This issue is particularly acute in global organizations with no standards for phone number formatting.

Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share

Leave a Reply

Your email address will not be published. Required fields are marked *