Stay informed with the Idenhaus Consulting Identity & Access Management digest. We curate the best IAM/IDM, IoT, Identity Governance/Federation, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are the 8 must-read articles from the first part of April 2018. Enjoy!
This Friday, April 20 at 12 PM ET!
We’ll introduce concepts such as provisioning, self-service, business workflow integration, and resource connection, as well as share mini-case studies on how organizations overcame IAM challenges. Register now to reserve your space.
Sixty percent of SMBs who were victims of cyber attacks did not recover and shut down within 6 months.
The eternal struggle: Security versus users via HelpNetSecurity
Anyone not working in cybersecurity is likely to assume that security is not their job and they are not responsible for dealing with it.
There is no silver bullet to IAM implementation challenges, but there are measures you can take to avoid common issues.
Cybersecurity modernization is a state of mind. It is a battle that CIOs and CISOs must wage against the ignorance and disinterest of key decision-makers.
Taking advantage of encrypted DNS services from Cloudflare or any other privacy-focused DNS services is not as easy as changing a number in network settings.
Don’t Give Away Historic Details About Yourself via Krebs on Security
You may be inadvertently giving away the answers to “secret questions” that can be used to unlock access to a host of your online identities and accounts.
Breaches Tied to Chat Network Provider via BankInfoSecurity
A spate of payment card breaches at some of the most recognized U.S. brands has been blamed on the hacking of India-based chat network provider 7.ai.
How to Build a Cybersecurity Incident Response Plan via DarkReading
Being hit by a cyberattack is going to be painful. But it can be less painful if you’re prepared, and these best practices can help.
Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us