9 Identity Management & Cybersecurity Articles, November 2018

Thanks for reading the biweekly Idenhaus Identity Management & Cybersecurity news digest. We curate a diverse selection of access management, RBAC, & cyber risk articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

We’re excited to head to the Gartner Identity Access Management Summit next week. If you’ll be in attendance, Hanno Ekdahl and Ron Bowron are happy to schedule time over breakfast or between sessions to answer your questions and share our implementation experience. Click here to book a time.

Here are 9 informative and insightful IAM and cybersecurity articles from November 2018. Enjoy!

 

7 Powerful Characteristics of a Strategic IAM Assessment via Idenhaus

 Identity and Access Management assessments are a vital first step to help organizations structure their programs and define a successful implementation strategy.

A Planning Guide for Identity and Access Management via CIOReview

In the era of digital transformation, every organization is figuring out how to manage digital identities for its employees and customers. Traditionally, IT owned all technology functions, and as a result, identity management automatically fell in their lap.

‘Cuddly’ German chat app slacking on hashing given a good whacking under GDPR: €20k fine via The Register

The regional data watchdog deemed that plain text storage of passwords breached legislation that implements the GDPR in Germany (specifically article 32 of the DS-SGVO), and imposed its first penalty under the regulation.

Half of all Phishing Sites Now Have the Padlock via Krebs on Security

A PhishLabs survey conducted last year found more than 80% of respondents believed the green lock indicated a website was either legitimate and/or safe.

European consumer organisations say Google breaching privacy rules  via TelecomPaper

A number of European consumer organisations say Google’s way of tracking user location is in breach of GDPR privacy rules.

Opinion: Morrisons, vicarious liability, and privacy risk management reality  via Infospectives

On the face of it, organisations were just made liable for nefarious data doings of any nasty individual they might have had the misfortune to employ…or nice employees who just mess up. Even if organisations do nothing wrong and things happen in spite of ‘appropriate’ control, they might be vicariously liable.

Less than half of federal agencies have met identity management rules via Fifth Domain

Only 41 percent of government agencies have met the federal guidelines for identity and access management, according to a Nov. 13 report.

How to Shop Online Like a Security Pro  via Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping.

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 3  via Idenhaus

RBAC is both manageable and attainable although many organizations struggle with RBAC. To realize its promise, a disciplined, methodical approach is key to successful deployment.

Check out last month’s Idenhaus Identity Management & Cybersecurity biweekly 8 Excellent Cybersecurity & Access Management Articles, October 2018.

 

An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share

Leave a Reply

Your email address will not be published. Required fields are marked *