
What is an Identity Management Strategy?
IAM is more than technology implementation. That’s why you need an Identity Management strategy. On its face, Identity Management (IAM) appears to be a straightforward exercise. It’s about validating a user’s identity and determining which user should have access to what. Simple, we’ll buy a product, install it, put in a few connectors, and there

9 Identity Management and Cybersecurity Articles, January 2021
Privacy law, IoT devices, and IAM resources headline this week’s digest of Identity Management and Cybersecurity Articles. Thanks for checking out this week’s digest of Identity Management and Cybersecurity articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered

7 Insightful Health Care Cyber Security Articles, January 2021
PACS Cybersecurity Guidance, ransomware, and HIPAA legislation headline this week’s digest of health care cyber security articles. Thanks for checking out the biweekly digest of helpful health care cyber security articles. Peruse our resources section for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity

Top 10 Identity Management Resources and Articles from 2020
Let’s take a look at our most popular Identity Management resources and articles from 2020, in no particular order. Wow, 2020 was quite the year. Cybercrime skyrocketed 600% due to the Covid-19 pandemic and health systems become an even more popular target for hackers. Ransomware attacks doubled in Q3 of 2020 and we saw the

7 Insightful Identity Governance and Cybersecurity Articles
IAM trends, IoT privacy, and PBAC headline this week’s digest of Identity Governance and Cybersecurity Articles. Thanks for checking out this week’s digest of Identity Governance and Cybersecurity articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays

7 Healthcare Security Articles, December 2020
Privacy, telehealth, and AI headline this week’s digest of Healthcare Security articles. Thanks for checking out the biweekly digest of helpful healthcare security articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare. Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe

Penetration Testing: Everything You Need to Know
Each year, cyber-attacks are getting more complex. Organizations cannot afford to implement security tools without validating that they are properly performing. Ineffective controls and human error can expose the most sophisticated systems to breaches, which often go undetected for months or even years. The best way to be proactive against the threat of a cyber-attack

16 Informative Identity Management Articles, December 2020
Identity Governance, IAM Acronyms, and Biometrics headline this week’s digest of IGA and cybersecurity articles. Thanks for checking out this week’s digest of IGA and cybersecurity articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8