ALL

Common Business Drivers for Adopting Identity Management Solutions

What are the common characteristics likely to influence a business’s decision to implement an Identity & Access Management solution? The business drivers for an IAM implementation project vary across organizations and categories, such as Finance, Healthcare, and Government. In this piece, we focus on the key drivers across industries as defined by our own survey of […]

Common Business Drivers for Adopting Identity Management Solutions Read More »

Prevent Your Cybersecurity “Castle in the Cloud” From Crumbling

The Fortress of the Knights, located in Syria, was one of the most impenetrable, secure castles in history. The surrounding land steeply slopes away, making access to the castle difficult and rendering traditional invasion methods ineffective. But, in 1271, it finally fell to a group of Muslim sultans who used stealth to take down the castle. In

Prevent Your Cybersecurity “Castle in the Cloud” From Crumbling Read More »

identity-iam-data-quality-idenhaus

Why Identity Management Success Depends on Good Data Quality

It has been said that IT systems are a lot like the Old Testament, lots of rules and no mercy! Identity Management solutions are no different because they process data according to defined rules that grant and revoke user access to the network and key applications. If there is bad data in the IAM system, users cannot get

Why Identity Management Success Depends on Good Data Quality Read More »

9 Informative Identity Management Articles, October 2017

Stay highly informed with our biweekly Identity Management & Cybersecurity news digest. We curate the best IAM & Cyber security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are 9 IAM & Cybersecurity articles to help ensure your Halloween is full of treats and not tricks.   How To Design, Choose And Implement The Right

9 Informative Identity Management Articles, October 2017 Read More »

Top Cybersecurity & Identity Management Articles, October 2017

Stay informed by receiving our biweekly Identity Management & Cybersecurity digest in your inbox. We curate high quality and relevant IAM & Cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are the top Cybersecurity and Access Management articles from October 2017. Equifax: Umm, actually hackers stole records of 15.2 million Brits, not

Top Cybersecurity & Identity Management Articles, October 2017 Read More »

How to Build an Expert, In-House Identity Management Team

The information security advocacy group ISACA predicts there will be a global shortage of 2 million cybersecurity professionals by 2019. Most companies already feel this pain, some more than others, and lack a skilled cybersecurity team. To deal with the tech workforce shortage, IBM is investing $1 billion into creating “new collar” jobs. These jobs prioritize skills,

How to Build an Expert, In-House Identity Management Team Read More »

10 Must-Read Identity Management & Data Breach Articles, September 2017

Stay informed by receiving our biweekly Identity Management & Cybersecurity digest in your inbox. We curate high quality and relevant IAM & Cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are the top Cybersecurity and Access Management articles from September 2017. Enjoy!   Digital transformation: how boards can weather the storm  via BoardAgenda Digitalisation

10 Must-Read Identity Management & Data Breach Articles, September 2017 Read More »

Avoid this Crippling Multi-Factor Authentication Security Mistake

Did you know 63 percent of confirmed data breaches involved leveraging weak, stolen, or default passwords? The traditional combination of username and password to login to a system offers limited protection from hackers. In an effort to shore up security and protect sensitive data, many organizations are implementing multi-factor authentication (MFA). The idea behind MFA is

Avoid this Crippling Multi-Factor Authentication Security Mistake Read More »

Colossal Equifax Data Breach Is Ominous Warning for Corporations

The massive scope of the Equifax data breach is almost as horrifying as the confidential personal data that was exposed. Approximately half of the U.S. population was impacted, as well as consumers in the U.K. and Canada. The sensitivity of the data (national id, financial history, addresses, birth date, etc.) makes this breach more serious

Colossal Equifax Data Breach Is Ominous Warning for Corporations Read More »

Scroll to Top