8 Excellent Cybersecurity & Access Management Articles, October 2018

October 31, 2018

Thanks for reading the biweekly Idenhaus Identity Management & Cybersecurity news digest. We curate a diverse selection of access management, RBAC, & cyber risk articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

We're excited to head to the Gartner Identity Access Management Summit in December. If you'll be in attendance, Hanno Ekdahl and Ron Bowron are happy to schedule time over breakfast or between sessions to answer your questions and share our implementation experience. Click here to schedule a time.

Here are 8 informative and insightful IAM and cybersecurity articles from late October 2018. Enjoy!


4 Key Benefits of Process Analysis in Identity Management via Idenhaus

Investing a mere 10% of your time upfront on analysis, planning, and design is a critical investment in your IAM program and will significantly improve your chances of success.

Education Department Warns Universities to Improve Identity Management via EdTech

As hackers attempt to target student loans, university IT teams need to take a look at their identity management systems.

Evolution of the Zero Trust Model for Cybersecurity via Homeland Security Today

To implement zero trust cybersecurity, four components are required: Devices, transport, cloud, and apps. Let’s examine the role of each in the context of a typical, modern enterprise deployment.

The AI Cold War That Threatens Us All  via Wired

In China and the West alike, power comes from controlling data, making sense of it, and using it to influence how people behave.

Third Party Tracking in the Mobile Ecosystem  via University of Oxford

Third party tracking allows companies to identify users and track their behavior across multiple digital services. This paper presents an empirical study of the prevalence of third-party trackers on 959,000 apps from the US and UK Google Play stores.

Quantum Computers will Break the Encryption that Protects the Internet via Economist

NIST is running a competition to kick the tires on various quantum-resistant proposals. But its conclusions are not due until 2024.

IDSA Integration Framework  via IDSA

The IDSA Integration Framework defines the capabilities and technologies that help organizations implement comprehensive, next-generation solutions that securely place identity at the center of security. The framework provides the high-level integration points giving customers and prospects a jump start on green field projects, as well as transforming existing infrastructure.

Successfully Integrating HR Processes with Identity Management [WEBINAR REPLAY] via Idenhaus

We had a great session on Friday discussing how to successfully integrate HR processes and Identity Management. Be sure to listen to the excellent Q&A at the end!


Learn more about the benefits of an IAM Assessment. An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.


Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

More News