Security

Colossal Equifax Data Breach Is Ominous Warning for Corporations

The massive scope of the Equifax data breach is almost as horrifying as the confidential personal data that was exposed. Approximately half of the U.S. population was impacted, as well as consumers in the U.K. and Canada. The sensitivity of the data (national id, financial history, addresses, birth date, etc.) makes this breach more serious …

Colossal Equifax Data Breach Is Ominous Warning for Corporations Read More »

What Is Threat Intelligence, Anyway?

This article was authored by Idenhaus’ Director of Cybersecurity, Derek Christensen. Threat Intelligence is experiencing its 15 minutes of fame as this year’s cybersecurity buzzword. It was a session topic at last month’s RSA Conference – From an Unknown Discipline to Cyber-Buzzword – and is considered a “must have” for all security analysts. Practically everyone is going on …

What Is Threat Intelligence, Anyway? Read More »

Top Cybersecurity Articles Trending this Week

Here are the top cybersecurity articles from January 14-27, 2016. Signup to receive biweekly updates here.    Nine of Ten Breaches Easily Avoidable, Study Finds Nine of every ten data breaches that occurred in the first eight months of 2015 were “easily avoidable,” underscoring the need for private sector investment in tools and processes to …

Top Cybersecurity Articles Trending this Week Read More »

9 Cyber Security Questions Every Executive Should Ask

According to 2015 Cost of Cyber Crime, recently released by The Ponemon Institute, the minimum cost of cyber crime to a company was $1.9M while the maximum cost was as much as $65M. As news of major cyber attacks becomes an almost weekly occurrence, organizations are still struggling to define a security model and determine how …

9 Cyber Security Questions Every Executive Should Ask Read More »

Takeaways from the 2015 Cybersecurity Forum in Atlanta

Here are some cool takeaways from the Cybersecurity Forum with Israel and the American South hosted by Baker Donelson at Georgia Tech. The conference was broad in scope and addressed a wide range of issues in Cybersecurity across people, process, and technology. Here are some of the most impactful sound bites from the forum: Today, …

Takeaways from the 2015 Cybersecurity Forum in Atlanta Read More »

Part 2: Defining Roles for IAM – From the Bottom Up

We believe that a two-pronged approach to roles definition is the key to implementing Role Based Access Control (RBAC) successfully. While there are tools that can automate the ‘bottom up’ approach, the old adage “Garbage In, Garbage Out” applies. If the data that you are basing your role definition on are bad, then a bottom …

Part 2: Defining Roles for IAM – From the Bottom Up Read More »

Roles Definition- Part I

Defining Roles: The Top-Down Process in Practice

Our path to well-defined roles begins with the system owner who evaluates the applications and which users should have access. When he determines that a group does not belong, for example, the accounting folks should not be on a particular application or system, he removes them…All of them. This first pass eliminates users who should …

Defining Roles: The Top-Down Process in Practice Read More »

Roles Definition- Part I

Part 1: Defining Roles for IAM – Begin at the Top!

Implementing roles-based access control is invaluable, when implemented correctly.  Roles simplify access management for employees, contractors, and external users by incorporating the business policies and rules necessary to grant appropriate access; allowing the Identity Management solution to grant, modify and revoke access automatically. Just as importantly, roles simplify compliance as well, making it easier to …

Part 1: Defining Roles for IAM – Begin at the Top! Read More »

Scroll to Top