Cybersecurity

FedRAMP: What Is It, and How Can It Benefit You?

In the past, we discussed NIST SP 800-171, but what about securing cloud-based products and services? Let’s dig deeper. Prior to FedRAMP, each agency had to establish its own security standards and dedicate specialized resources. This would make things more complicated and make security across agencies a nightmare. Many agencies lack the funding necessary to […]

FedRAMP: What Is It, and How Can It Benefit You? Read More »

New Federal Reporting Requirements, California’s Privacy Rules Trickling Down and More

  Thanks, as always, for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8PM ET. New Federal Reporting Requirements Demand Timely and Accurate Cyber-intelligence via

New Federal Reporting Requirements, California’s Privacy Rules Trickling Down and More Read More »

Securing The Internet of Medical Things, Updated Guidance for Healthcare Cybersecurity and More

  Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you. Want to know more about IAM for healthcare, or

Securing The Internet of Medical Things, Updated Guidance for Healthcare Cybersecurity and More Read More »

Identity Management and the Second Half of the Chessboard

by Hanno Ekdahl Ray Kurzweil coined the phrase “second half of the chessboard” when describing the point where an exponentially growing factor begins to have a significant economic impact on an organization’s overall business strategy, in particular with regard to technology. Small issues in data quality, solution design, and processes become a force multiplier at

Identity Management and the Second Half of the Chessboard Read More »

Staggering Up Legacy OS Hill, Staying Ahead Of Hackers With AI & IAM and More

Sometimes, it can feel like your organization is stuck in a cybersecurity rut. Other times, your organization is actually stuck, but not in any rut- just in the legacy systems that continue to work enough to not need replacing. Legacy systems are creating plenty of extra issues for those who have to keep using them

Staggering Up Legacy OS Hill, Staying Ahead Of Hackers With AI & IAM and More Read More »

Scroll to Top