Stay informed with our biweekly Identity Governance, Access Management, & Cybersecurity updates. We curate the best IAM & information security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are 9 of our favorite Identity Access Management, & Cybersecurity articles for late January/early February 2018.
For many of those users, their Gmail account is their primary — and often only — email account. And it’s linked to dozens or even hundreds of their most important online accounts.
By the end of June 2018, all federal agencies will be required to have legacy systems and applications in compliance with the guidelines.
Data Maps Drive Successful IAM Projects via Idenhaus
In order to get your data right, we recommend starting with a data map to identify key systems and user attributes and how they flow across connected systems.
A whopping 70% of consumers stated they would stop doing business with an organization if it experienced a data breach.
How hackers recycle top threats via TrendMicro
Many of these reused threats are leveraged in combination with new and sophisticated infection strategies, making them even more difficult to protect against.
A new survey of federal IT leaders cites identity management as one of the most important methods for protecting agency networks, but slimmed-down budgets make it hard to implement effectively.
Expanding Role of CISO: 7 Attributes of a Successful Security Leader via IBM SecurityIntelligence
If CISOs wish to play a bigger role, they must not only have the necessary technical expertise and leadership skills, but also understand their company’s operations and articulate security priorities from a business perspective.
This NIST Internal Report contains a metadata schema for attributes that may be asserted about an individual during an online transaction.
Governance helps organizations overcome challenges by facilitating dialog across all the key stakeholders and driving a true understanding of the business needs and what the technology offers.
Also, be sure to download my new, FREE digital book entitled How To Design, Choose And Implement The Right IAM Solution For Your Business.
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us