identity management

Mastering Identity Management: When Your HRIS System Falls Short

Identity Management (IAM) is built around the concept of establishing a “Gold Standard” data set for each user that is: 1) accurate, 2) actively maintained, and 3) available. In IAM, answering the question “Who are you?” depends on having access to the most current information for each user (employee or contractor) on the network. Usually, […]

Mastering Identity Management: When Your HRIS System Falls Short Read More »

5 Must-Read Identity Management Articles, April 2016

  This week’s curated Identity Management & Cybersecurity News covers crippling ransomware, healthcare breaches, IAM challenges for industrial systems, new HIPAA protocol, and more. Get this biweekly update delivered to your inbox. OK, panic—newly evolved ransomware is bad news for everyone There’s something inherently world-changing about the latest round of crypto-ransomware that has been hitting a wide range

5 Must-Read Identity Management Articles, April 2016 Read More »

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer

Stakeholders are an important asset and are critical to the success of your Identity and Access Management program. Few IT projects have such far-reaching scope as Identity Management (IAM) engagements, touching stakeholders across all business domains. The breadth of IAM’s reach is also its downfall – with new requirements springing up like mushrooms after a

Mastering Identity Management: Keep Your Friends Close and Your Stakeholders Closer Read More »

Does your Identity Management Program Pass the ‘Marshmallow Test’?

There is a famous series of studies about self-discipline called the ‘Marshmallow Test’ that was run by Stanford University in the 60s and 70s. During these studies, children were offered a choice between getting a single marshmallow immediately or getting a whole bag of marshmallows if they waited for a short period, during which the

Does your Identity Management Program Pass the ‘Marshmallow Test’? Read More »

4 Identity Management Articles You May Have Missed

  Every two weeks we deliver a curated digest of Identity Management and Cybersecurity News to security leaders, IT professionals, and CISO/CSOs. Based on subscriber feedback, we’ve selected the most popular articles to highlight here.   BitLocker encryption can be defeated with trivial Windows authentication bypass In its own documentation, Microsoft admits that preboot authentication is “unacceptable

4 Identity Management Articles You May Have Missed Read More »

How a Solution Roadmap Aligns IT and Business Strategy

The challenge to successfully implement IT solutions that deliver their expected value to the organization is ongoing. According to an IBM study, only 40% of IT projects meet schedule, budget and quality goals. The root cause of this issue, according to the Project Management Institute, is a lack of alignment between the project and the

How a Solution Roadmap Aligns IT and Business Strategy Read More »

Scroll to Top