7 Must-Read Articles to Improve Your Identity Management Strategy

May 30, 2018

Every two weeks, we feature the latest IAM/IDM industry news, cybersecurity happenings, and Identity Management thinking with the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

Here are 7 informative IAM/IDM articles from late May 2018. Enjoy!

How IAM Can Help Move the Finish Line for Hackers via CSO Online

On one hand, we leverage IAM solutions so that we can make sure the business can remain agile, user requests are handled automatically, and accounts are provisioned and deprovisioned in target systems quickly and efficiently. And on the other hand, IAM is leveraged to create a framework for security.

FBI Releases the IC3 2017 Internet Crime Report and Calls for Increased Public Awareness via FBI

The top three crime types reported by victims in 2017 were non-payment/non-delivery, personal data breach, and phishing.

8 Benefits of an Identity & Access Management Roadmap via Idenhaus

While many organizations do a good job of laying out their technical requirements, too often they fail to link their implementations to business outcomes and fail to build the right IAM foundation to solve the organization’s most pressing business problems.

Blockchain for Identity Management: Early Examples via BankInfoSecurity

Blockchain isn't a silver bullet for identity management - particularly in a scenario where the blockchain is private and therefore susceptible to third-party manipulation.

FDA Finally Suggests Meaningful Action to Secure Medical Devices via ICIT

Rather than continue to focus on post-market device risk analysis, the FDA is adapting their approach to focus on layered security at each stage of the device lifecycle.

How a Solution Roadmap Aligns IT and Business Strategy via Idenhaus

The simplest and most effective way to link your business strategy with your IAM program is to build a solution roadmap, which lays out your plan for the next 1 to 2 years. The process to create a roadmap requires input from both technical and business stakeholders and makes the implicit explicit.

First-Ever Ransomware Found Using ‘Process Doppelgänging’ Attack to Evade Detection via TheHackerNews

Security researchers have spotted the first-ever ransomware exploiting Process Doppelgänging, a new fileless code injection technique that could help malware evade detection.


Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

More News