Stay informed with our biweekly Identity Management & Cybersecurity news digest. We curate the best IAM & Cyber security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are the top 8 IAM and cybersecurity articles from August 2018. Enjoy!
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here’s what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.
Organizations can no longer take an internally focused view of IAM. You need to find ways to enable controlled and secure access for employees, partners, mobile workers, contractors, and customers. In this context, GDPR requires that you pay close attention to how all actors access the sensitive, personal data that you hold.
Controlling and Monitoring Access to Sensitive Data in the Cloud via InsideBigData
The lack of visibility across the infrastructure is one of the main drawbacks of the cloud-based solutions. Therefore, there is a need to ensure end-to-end visibility into the infrastructure, critical data, and applications.
Building the onboarding of the future takes real discipline and a willingness to change what isn’t working. Too often organizations deploying new systems choose instead to do a “lift and shift,” retaining old process with the new system.
Coinbase Exchange Expanding Into Digital Identity Management via CryptoDisrupt
With assets becoming increasingly digitalized, there is now more at stake than ever. Knowing somebody’s phone number can be enough to hack millions of dollars, with a simple sim card swap using basic social engineering.
Here are 20 ways that distributed ledger technology (DLT) could be deployed by school districts, networks, postsecondary institutions, and community-based organizations to improve learning opportunities.
The CCPA is considered one of the toughest data privacy laws in the United States and will dramatically impact how businesses handle data.
Why an IAM Assessment is the Secret to Success via Idenhaus
Having the discipline to understand the Current State environment first will allow you to build a Future State solution that delivers.
Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us