7 Must-Read IDM & Cybersecurity Articles, January 2019

cybersecurity articles

Thanks for reading the biweekly Idenhaus Identity Management & Cybersecurity digest. We curate a diverse selection of access management, RBAC, & cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

This week’s news digest includes 7 informative and insightful IAM and cybersecurity articles from late December 2018 and early January 2019. Enjoy!

 

Top IAM, RBAC, and Cybersecurity Articles from 2018 via Idenhaus

What were Identity & Access Management and Cybersecurity experts reading in 2018? Let’s take a look back at our most well-received articles from 2018.

Hackers Make a Fake Hand to Beat Vein Authentication via Motherboard

Security researchers disclosed new work at the Chaos Communication Congress showing how hackers can bypass vein based authentication.

HHS Releases Voluntary Cybersecurity Practices for Health Industry via NextGov

The guidance is a mixture of highly technical solutions and common sense practices applicable to a wide range of healthcare facilities.

How IAM Solves Onboarding and Offboarding Challenges via SolutionsReview

Onboarding and offboarding can be a nightmare for IT security teams, especially for large and scaling enterprises. Thankfully, identity and access management (IAM) solutions can help your IT security team tackle the challenges within these major transitional processes.

The Four Essential Personalities for a Strong Cybersecurity Team  via NetworkComputing

Many believe that it takes a certain personality type to fit in a cybersecurity team, when in fact a diversity of traits strengthens a team.

GDPR: Four letters that put fear into firms’ hearts in 2018  via The Register

Data brokers, credit checking agencies and marketeers have all come under the spotlight this year, and efforts to open people’s eyes to the data that is held on them by firms they may never have heard of are well under way.

Why an IAM Assessment Boosts Chances of Implementation Success  via Idenhaus

The starting point for building a solid IAM foundation begins with an assessment that includes identifying key stakeholders, core user management processes, authoritative data sources, and points of integration both from a business and a technical point of view.

 

Check out last month’s Idenhaus Identity Management & Cybersecurity news digest Your Identity Management & Cybersecurity News Digest, December 2018

 

An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top