Building a Culture of Cybersecurity with Strategies for Training and Awareness

Building a Culture of Cybersecurity: Strategies for Training and Awareness Written by TJ Rubeck In today’s rapidly evolving threat landscape, employees are often considered the weakest link in cybersecurity. Attackers often target human vulnerabilities through social engineering attacks, phishing, or other related threats. The increasing frequency and sophistication of cyber attacks have made one thing […]

Building Cyber Resilience

By Sandhya Sukumar  Organization leaders worldwide are increasingly aware that one single cybersecurity solution does not exist to tackle today’s sophisticated and rapidly evolving cybercrimes. Even with strengthened defenses, threat actors can find weaknesses and vulnerabilities to infiltrate a company’s network and IT Infrastructure. Moreover, modern IT infrastructures are complex, interconnected ecosystems involving multiple organizations […]

The Importance of Multiple IT Environments

By Richard Hawes Very early in my IT career, I learned that, as a matter of general best practice, companies almost always have at least two environments for critical systems and usually three for application development and management. Some companies, depending on their complexity and needs, have more than that. This is to enable the […]

Five Cybersecurity Quick Wins

Five Cybersecurity Quick Wins   Cybersecurity is now a primary responsibility for companies of all kinds as the world embraces digital transformation. A data breach can have catastrophic financial and reputational consequences. With this in mind, it is crucial to take proactive measures to protect your organization’s assets. These five fast wins below can significantly […]

Identity First Security

By Leah Livingston Idenhaus attended last Monday’s Gartner session titled, “Identity-First Security as the North Star for Your IAM Reimplementation” led by Mary Ruddy. She focused on a key area that’s gaining attention: Identity-First Security. As the ecosystem evolves once again, Enterprises large and small are making the necessary shifts. The best part? Identity tools […]

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century By Leah Livingston By now, if you haven’t heard of OpenAI’s ChatGPT, then check out the blog that ChaptGPT wrote with us which provides a very clear definition. The chatter across industry circles has burned like wildfire on social media, podcasts, and chat forums; […]

Security Questions- Boon or Bane?

We’ve all done it- filled out a casual quiz on social media, or answered silly questions which, thinking about it, might be answers to those security questions they ask when you login… Let’s have a look at the reason behind security questions, and then ask ourselves: how can we remember all of this? How tempted […]

Fresh Reading for IAM Professionals, September 2021

Cybersecurity updates

Join us as we take a tour of the news surrounding cyber security. From the latest cryptocurrency security struggles, to the arguments for and against cyber insurance. Does it help, or is it actually doing more harm now than good?  Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here […]

5 Common Pre-Breach Mistakes Organizations Make With Cyber Security

Join us for this second installment of our series, 5 Most Common Pre-Breach Mistakes Organizations make with Cyber Security. Last time we talked about Mistake One: Insufficient Information Security Independence. Today we’re discussing the second mistake, which is the inadequate use of outside assessors to help create a strong security plan. Second Mistake: Poor Use […]

7 Healthcare Security Articles, December 2020

healthcare security

Privacy, telehealth, and AI headline this week’s digest of Healthcare Security articles. Thanks for checking out the biweekly digest of helpful healthcare security articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare. Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe […]