Top IAM, RBAC, and Cybersecurity Articles from 2018

Share on linkedin
Share on twitter
Share on facebook

cybersecurity articles from 2018

What were Identity & Access Management and Cybersecurity experts reading in 2018?

Let’s take a look back at our most well-received articles from 2018. They fall into three categories: Identity Management, role based access control, and cybersecurity risk.

Here are the most-read IAM, RBAC, and cybersecurity articles from 2018.

Role Based Access Control (RBAC)

Role based access control is a methodical approach to provisioning based upon roles and privileges in contrast to a rule-based or discretionary approach. Roles simplify access management for employees, contractors, and external users by incorporating the business policies and rules necessary to grant appropriate access.

How to Successfully Introduce Role Based Access Control into a Group Environment

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 2

How to Successfully Introduce Role Based Access Control into a Group Environment, Part 3

 

Identity Management

Most organizations approach identity management projects tactically, rather than stepping back and determining a course of action that will solve enterprise-wide issues. Starting with a tactical approach is both short-sighted and high risk, leading to failed projects, unnecessary expense, and the delay of beneficial results. A cohesive Identity Management strategy provides a context for individual projects, which will then be seen as a supporting element of a unified plan that has an impact at an enterprise level.

8 Benefits of an Identity & Access Management Roadmap

Why an IAM Assessment Boosts Chances of Implementation Success

7 Powerful Characteristics of a Strategic IAM Assessment

 

Cybersecurity Risk

Organizations are confronting increasingly sophisticated and unrelenting cyber threats from entities that are intent on finding and exploiting vulnerable targets. Don’t give hackers free rein to pillage your information and assets.

Why Defense-in-Depth Is Critical to Cybersecurity Strategy

How to Measure the Effectiveness of Your Cybersecurity Program

 

 

An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *