8 Insightful Identity Governance & GDPR Articles, April 2019

Share on linkedin
Share on twitter
Share on facebook

insightful identity governance articles idenhaus

Thanks for reading our biweekly roundup of insightful Identity Governance & Cybersecurity articles. We curate a diverse selection of IAM, GDPR, Role Based Access Control, and Identity Management articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.

 

GDPR Overview with Jodi Daniels, Privacy Consultant via Idenhaus

GDPR is the most important change in data privacy in the past 20 years and fundamentally reshapes the way data is handled across every sector.

Why Cyber Security is Key to Enterprise Risk Management for all Organizations via TripWire

Because the stakes are so astronomical, all organizations must be focused and vigilant about emphasizing cyber security as an essential component of their overall enterprise risk management strategy.

Kubernetes Identity Management: Authentication via Linux Journal

K8s is very different from most other systems and applications. It’s a set of APIs. There’s no “web interface” (I discuss the dashboard later in this article). There’s no point to “log in”. There is no “session” or “timeout”. Every API request is unique and distinct, and it must contain everything k8s needs to authenticate and authorize the request.

GDPR’s Most Frequently Asked Questions: Are processors required to fully indemnify controllers for the actions of their subprocessors and subcontractors? via BCLP Law

Answer: Yes. The GDPR imposes two requirements when a company uses a service provider. Read the article to learn more about this GDPR FAQ.

Uncovering a decade of myths about identity governance via ITProPortal

In this age of the digital transformation, the business world moves quickly, entails more types of applications and data, involves more types of users whose access needs close governance, and is exponentially more complicated for IT to enable than ever before.

These are the cyberthreats lurking in your supply chain via MIT Sloan

Organizations often fail to consider attack vectors originating, intentionally or unintentionally, with outside individuals, contractors, firms, or groups that are authorized to access those systems — so-called third-party or supply chain cyberattacks.

ForgeRock Launches Identity Live Series in Nashville – April 30 and May 1 via GlobalNewswire

ForgeRock, the leading platform provider of digital identity management solutions, today announced keynote and customer presentations for its upcoming Identity Live Summit. The first of its global series will be held in Nashville, Tennessee on April 30 and May 1.

6 Common Role Based Access Control (RBAC) Implementation Pitfalls  via Idenhaus

Role based access control (RBAC) has been around for a long time, but that doesn’t mean it’s easy to implement.

 

Check out our previous digest of insightful Identity Governance and cybersecurity articles here: 7 Must-Read Identity Governance & Cybersecurity Articles, April 2019

 

 

An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *