Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos.
Subscribe to the Idenhaus biweekly newsletter here.
Role Based Access Control (RBAC) and Systems Thinking via Idenhaus
As organizations mature in scale and complexity, so too does managing the complexity of user access and the corresponding risk governance issues. With this in mind, Role Based Access Control (RBAC) provides a framework to help manage user access in the context of a rapidly changing and more complex risk profile.
How well are healthcare organizations protecting patient information? via HelpNet Security
The balance between optimizing the user experience and protecting the data must be achieved in an effective cybersecurity strategy: HCOs need to make it easy for patients and partners to access records while ensuring adequate data protection.
Hackers Favor Weekdays for Attacks, Share Resources Often via ThreatPost
When researchers looked at the web-filtering volume from two Cyber Kill Chain phases, comparing weekdays and weekends, they discovered that pre-compromise activity is roughly three times more likely to occur during the work week.
Identity Management Sparks Friction Between Executives, Employees via WSJ
Hackers often attack company networks using compromised login information. Experts say the solution is secure yet flexible identity-management tools and practices — but figuring out what is best isn’t easy.
92% of SMBs Struggle With Identity Challenges via Solutions Review
Recently, password manager LastPass unveiled their latest study: SMBs Guide to Modern Identity. Among their critical finds, 92% of small-to-medium-sized businesses (SMBs) deal with identity challenges in their environments. 47% cite ease of use as their biggest challenge.
Planning a cloud migration? Get your identity privileges in check first via BetaNews
Enterprises are generally aware of the problem and want to fix it, but they rarely know where to start or what to do. A big pain point is that they don’t have the level of visibility required to understand what actions identities are authorized to perform on critical resources across multiple, complex and vastly different cloud operating models. As such, cloud migrations are an ideal time to prioritize identity privilege management.
Mercedes Thieves Showed Just How Vulnerable Car-Sharing Can Be via Bloomberg
After Car2Go eased its background checks, 75 of its vehicles were stolen in one day. The mass theft in Chicago illustrates a persistent challenge for car-sharing companies looking to draw in members with access to expensive makes and models.
Why IDM is the Secret to Creating the Onboarding of the Future via Idenhaus
Automation is the key to making the onboarding process—a critical business process—work for your organization. But how do you decide what parts of the process are worth the effort to automate?
Check out our previous digest of insightful Identity Governance and access management articles here: Idenhaus Biweekly: RBAC, Healthcare Cybersecurity, Identity Management
Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us