Thanks for reading the biweekly Idenhaus Identity Management & Cybersecurity news digest. We curate a diverse selection of access management, RBAC, & cyber risk articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
We’re excited to head to the Gartner Identity Access Management Summit in December. If you’ll be in attendance, Hanno Ekdahl and Ron Bowron are happy to schedule time over breakfast or between sessions to answer your questions and share our implementation experience. Click here to schedule a time.
Here are 8 informative and insightful IAM and cybersecurity articles from late October 2018. Enjoy!
Investing a mere 10% of your time upfront on analysis, planning, and design is a critical investment in your IAM program and will significantly improve your chances of success.
As hackers attempt to target student loans, university IT teams need to take a look at their identity management systems.
Evolution of the Zero Trust Model for Cybersecurity via Homeland Security Today
To implement zero trust cybersecurity, four components are required: Devices, transport, cloud, and apps. Let’s examine the role of each in the context of a typical, modern enterprise deployment.
The AI Cold War That Threatens Us All via Wired
In China and the West alike, power comes from controlling data, making sense of it, and using it to influence how people behave.
Third Party Tracking in the Mobile Ecosystem via University of Oxford
Third party tracking allows companies to identify users and track their behavior across multiple digital services. This paper presents an empirical study of the prevalence of third-party trackers on 959,000 apps from the US and UK Google Play stores.
NIST is running a competition to kick the tires on various quantum-resistant proposals. But its conclusions are not due until 2024.
IDSA Integration Framework via IDSA
The IDSA Integration Framework defines the capabilities and technologies that help organizations implement comprehensive, next-generation solutions that securely place identity at the center of security. The framework provides the high-level integration points giving customers and prospects a jump start on green field projects, as well as transforming existing infrastructure.
We had a great session on Friday discussing how to successfully integrate HR processes and Identity Management. Be sure to listen to the excellent Q&A at the end!
Learn more about the benefits of an IAM Assessment. An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.
This is ideal for organizations that:
- Are struggling to get their IAM solutions deployed
- Have a misalignment between their processes and technology
- Have an immature IAM solution with too many workarounds
- Companies that want to accelerate their IAM programs
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us