Stay informed with our biweekly Identity Management & Cybersecurity news digest. We curate the best IAM & Cyber security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are the top 8 IAM and cybersecurity articles from August 2018. Enjoy!
What is phishing? How this cyber attack works and how to prevent it via CSO
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here’s what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.
Identity and Access Management is pivotal for GDPR compliance via OpenText
Organizations can no longer take an internally focused view of IAM. You need to find ways to enable controlled and secure access for employees, partners, mobile workers, contractors, and customers. In this context, GDPR requires that you pay close attention to how all actors access the sensitive, personal data that you hold.
Controlling and Monitoring Access to Sensitive Data in the Cloud via InsideBigData
The lack of visibility across the infrastructure is one of the main drawbacks of the cloud-based solutions. Therefore, there is a need to ensure end-to-end visibility into the infrastructure, critical data, and applications.
How to Connect HR Processes to Identity Management, Part 1 via Idenhaus
Building the onboarding of the future takes real discipline and a willingness to change what isn’t working. Too often organizations deploying new systems choose instead to do a “lift and shift,” retaining old process with the new system.
Coinbase Exchange Expanding Into Digital Identity Management via CryptoDisrupt
With assets becoming increasingly digitalized, there is now more at stake than ever. Knowing somebody’s phone number can be enough to hack millions of dollars, with a simple sim card swap using basic social engineering.
20 Ways Blockchain Will Transform (Okay, May Improve) Education via Forbes
Here are 20 ways that distributed ledger technology (DLT) could be deployed by school districts, networks, postsecondary institutions, and community-based organizations to improve learning opportunities.
California’s Mini-GDPR? The Newly-Enacted California Consumer Privacy Act of 2018 via Lexology
The CCPA is considered one of the toughest data privacy laws in the United States and will dramatically impact how businesses handle data.
Why an IAM Assessment is the Secret to Success via Idenhaus
Having the discipline to understand the Current State environment first will allow you to build a Future State solution that delivers.
Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.
Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us