Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance

Share on linkedin
Share on twitter
Share on facebook

idenhaus-biweekly-data-quality

Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos.

Subscribe to the Idenhaus biweekly newsletter here.

Security Thought of the Week

Taking a “Systems Thinking” approach to IT solutions to drive Superlative Outcomes

Technology is often seen as the solution to all problems in and of itself; however, there are often changes in other systems and processes that determine how much of an impact the deployed technology can have. If your solution depends on data or other outputs from business processes that are sub-par, then your solution will have a limited impact. By broadening our analysis to look at the system, we can deliver better results from our technology investments.

7 Must-Read Articles on Data Quality, PAM, and GDPR Compliance

 

Mini Case Study: Getting a Handle on User Data via Idenhaus

Nicole Keaton Hart and Hanno Ekdahl share a mini case study on the importance of establishing a system of record to maintain user data quality.

 

Discover Details on Unified Endpoint Management via TechTarget

UEM software consolidates device and application management platforms for mobile devices, desktops, printers, wearables IoT devices, and other endpoints.

 

Does Your Identity and Access Management Program Put People First? via Security Intelligence

Organizations struggle to gain user adoption, resulting in costly inefficiencies, ineffective IAM solutions that don’t meet user needs, and unanticipated disruption to the business — all of which can lead to overall program failure.

 

By the Numbers: Why You Need To Improve Your Privileged Access Management via Solutions Review

In modern cybersecurity, failing to enact strong, next-generation privileged access management (PAM) leaves your enterprise profoundly vulnerable. Instead of waiting for a breach, you need to take the first steps to improve your privileged access management.

 

‘Anonymised’ data can never be totally anonymous, says study via The Guardian

“Anonymised” data lies at the core of everything from modern medical research to personalized recommendations and modern AI techniques. Unfortunately, according to a paper, successfully anonymizing data is practically impossible for any complex dataset.

 

Nearly a third of European firms still not GDPR compliant via CityAM

Almost a third of European businesses are still not compliant with the wide-ranging European Union laws on data protection and privacy introduced last year, according to accounting firm RSM.

 

Why Identity Management Success Depends on Good Data Quality  via Idenhaus

Accurate data enables your Identity & Access Management system to function properly, making IT operations efficient and users productive. Bad data quality simply produces bad results faster.

 

Check out our previous digest of insightful Identity Governance and access management articles here: Idenhaus Biweekly: 8 Must-Read Identity & Cybersecurity Articles

 

Identity Management-Role Based Access Control Best Practices

NEW ON-DEMAND WEBINAR: If you missed our recent webinar “Identity Management: Role Based Access Control Best Practices”, you can watch the replay here.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

 

Photo credit: ConvertGDPR


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *