Category Archives: Security

9 Must-Read Security & Identity Management Articles, June 2018

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here …Read More

Share

6 Cyber Risk Insights from AIG and Axio’s Executive Risk Summit

Idenhaus recently attended AIG and Axio’s Executive Risk Summit, which brought together a panel of insurance experts to discuss Cyber Risk management. Cyber exposures are expanding rapidly as businesses move their IT systems to the cloud and adopt the Internet of Things (IoT) …Read More

Share

What Is Threat Intelligence, Anyway?

This article was authored by Idenhaus’ Director of Cybersecurity, Derek Christensen. Threat Intelligence is experiencing its 15 minutes of fame as this year’s cybersecurity buzzword. It was a session topic at last month’s RSA Conference – From an Unknown Discipline to Cyber-Buzzword …Read More

Share

Top Cybersecurity Articles Trending this Week

Here are the top cybersecurity articles from January 14-27, 2016. Signup to receive biweekly updates here.    Phishing Attacks: What Can Be Done To Stop Staff From Causing a Data Breach? A recent report by the Ponemon Institute puts the …Read More

Share

9 Cyber Security Questions Every Executive Should Ask

According to 2015 Cost of Cyber Crime, recently released by The Ponemon Institute, the minimum cost of cyber crime to a company was $1.9M while the maximum cost was as much as $65M. As news of major cyber attacks becomes an …Read More

Share

Takeaways from the 2015 Cybersecurity Forum in Atlanta

Here are some cool takeaways from the Cybersecurity Forum with Israel and the American South hosted by Baker Donelson at Georgia Tech. The conference was broad in scope and addressed a wide range of issues in Cybersecurity across people, process, …Read More

Share

Part 2: Defining Roles for IAM – From the Bottom Up

We believe that a two-pronged approach to roles definition is the key to implementing Role Based Access Control (RBAC) successfully. While there are tools that can automate the ‘bottom up’ approach, the old adage “Garbage In, Garbage Out” applies. If …Read More

Share

Defining Roles: The Top-Down Process in Practice

Our path to well-defined roles begins with the system owner who evaluates the applications and which users should have access. When he determines that a group does not belong, for example, the accounting folks should not be on a particular …Read More

Share
Roles Definition- Part I