Your Identity Management & Cybersecurity News Digest, December 2018

Share on linkedin
Share on twitter
Share on facebook

Cybersecurity News Digest

Thanks for reading the biweekly Idenhaus Identity Management & Cybersecurity news digest. We curate a diverse selection of access management, RBAC, & cyber risk articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

For this week’s cybersecurity news digest, here are 7 informative and insightful IAM and cybersecurity articles from December 2018. Enjoy!

 

Highlights from “CISO Perspectives on Privileged Access Management” #GartnerIAM via Idenhaus

The successful implementation of a PAM solution is more than just installing a new technology; it requires communication, training, and a change in organizational culture.

Managing a Chaotic Heterogeneous Network? You’re Not Alone via Network Computing

Today’s reality is multi-vendor, hybrid environments that are hard to manage and secure. Those who can overcome these challenges can deliver greater performance and enhanced functionality for end users.

Understanding Privileged Access Management in 2019 via SolutionsReview

PAM in 2019 will not simply rely on deploying the proper solution. Instead, it will also rely on enterprise IT security teams utilizing the advantages of their PAM solutions to increase their visibility and secure their logins.

8 Cyber Attack Simulation Tools to Improve Security via GeekFlare

Those days are gone where you rely on an annual or quarterly penetration test results. The following tools let you simulate a real attack against your data center so you can review the results and take action today.

Every day is a fire drill for bank cybersecurity teams  via AmericanBanker

Cyberthieves continually hack away at weaknesses in banks’ digital defenses, sometimes coming in waves that involve thousands of attacks.

5 Tips to Harden Network Security in a Connected Enterprise  via Network Computing

As security efforts evolve from the fixed edge to the elastic edge, organizations need to combine traditional and new best practices to keep their networks safe from today’s evolving cyber threats.

8 Benefits of an Identity & Access Management Roadmap  via Idenhaus

While many organizations do a good job of laying out technical requirements, too often they fail to link IAM implementations to business outcomes.

 

Check out last month’s Idenhaus Identity Management & Cybersecurity news digest 9 Identity Management & Cybersecurity Articles, November 2018

 

An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *