Every two weeks, we curate the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. Subscribe to our biweekly newsletter here.
Here are the top IAM and cybersecurity articles from early August 2018. Enjoy!
Why an IAM Assessment is the Secret to Success via Idenhaus
Having the discipline to understand the Current State environment first will allow you to build a Future State solution that delivers.
This list is a starter kit for developers who want to get better at writing code more securely the first time around—to catch vulnerabilities before the code goes to production.
Without reconciliation there is no real access governance, and at the same time, reconciliation facilitates the operation of the identity management and access governance solution.
This article discusses whether it’s possible to assess a software development house’s SSDLC maturity using source code metrics or results of a code review.
During this webinar, we walk through mini-case studies that showcase common problems and provide recommendations to improve data quality and drive new results from your existing IAM systems.
Don’t fall for these text scams asking for your passwords via YahooFinance
The best way to avoid smishing scams is to simply ignore any texts you get from numbers you don’t recognize.
LifeLock Exposes Millions Of Customer Email Addresses via InformationSecurityBuzz
Security blogger, Brian Krebs, posted yesterday that identity theft protection firm LifeLock — a company that’s built a name for itself based on the promise of helping consumers protect their identities online — may have actually exposed customers to additional attacks from ID thieves and phishers.
Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us