8 Must-Read IDM & Cybersecurity Articles, August 2018

Stay informed with our biweekly Identity Management & Cybersecurity news digest. We curate the best IAM & Cyber security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

Here are the top 8 IAM and cybersecurity articles from August 2018. Enjoy!

 

What is phishing? How this cyber attack works and how to prevent it via CSO

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here’s what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Identity and Access Management is pivotal for GDPR compliance  via OpenText

Organizations can no longer take an internally focused view of IAM. You need to find ways to enable controlled and secure access for employees, partners, mobile workers, contractors, and customers. In this context, GDPR requires that you pay close attention to how all actors access the sensitive, personal data that you hold.

Controlling and Monitoring Access to Sensitive Data in the Cloud  via InsideBigData

The lack of visibility across the infrastructure is one of the main drawbacks of the cloud-based solutions. Therefore, there is a need to ensure end-to-end visibility into the infrastructure, critical data, and applications.

How to Connect HR Processes to Identity Management, Part 1 via Idenhaus

Building the onboarding of the future takes real discipline and a willingness to change what isn’t working. Too often organizations deploying new systems choose instead to do a “lift and shift,” retaining old process with the new system.

Coinbase Exchange Expanding Into Digital Identity Management  via CryptoDisrupt

With assets becoming increasingly digitalized, there is now more at stake than ever. Knowing somebody’s phone number can be enough to hack millions of dollars, with a simple sim card swap using basic social engineering.

.

20 Ways Blockchain Will Transform (Okay, May Improve) Education via Forbes

Here are 20 ways that distributed ledger technology (DLT) could be deployed by school districts, networks, postsecondary institutions, and community-based organizations to improve learning opportunities.

California’s Mini-GDPR? The Newly-Enacted California Consumer Privacy Act of 2018 via Lexology

The CCPA is considered one of the toughest data privacy laws in the United States and will dramatically impact how businesses handle data.

Why an IAM Assessment is the Secret to Success via Idenhaus

Having the discipline to understand the Current State environment first will allow you to build a Future State solution that delivers.

 

Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share

Leave a Reply

Your email address will not be published. Required fields are marked *