8 Must-Read Identity Management & Cybersecurity Articles, April 2018

April 18, 2018

Stay informed with the Idenhaus Consulting Identity & Access Management digest. We curate the best IAM/IDM, IoT, Identity Governance/Federation, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

Here are the 8 must-read articles from the first part of April 2018. Enjoy!

Identity & Access Management: Project Challenges and Recovery [WEBINAR]

This Friday, April 20 at 12 PM ET!
We'll introduce concepts such as provisioning, self-service, business workflow integration, and resource connection, as well as share mini-case studies on how organizations overcame IAM challenges. Register now to reserve your space.


4 main reasons why SMEs and SMBs fail after a major cyberattack via CSOOnline

Sixty percent of SMBs who were victims of cyber attacks did not recover and shut down within 6 months.


The eternal struggle: Security versus users via HelpNetSecurity

Anyone not working in cybersecurity is likely to assume that security is not their job and they are not responsible for dealing with it.


7 Reasons Why Identity Management Implementations Fail, And How to Overcome Them via Idenhaus

There is no silver bullet to IAM implementation challenges, but there are measures you can take to avoid common issues.


Dispelling the Fear of IT Modernization via ICIT

Cybersecurity modernization is a state of mind. It is a battle that CIOs and CISOs must wage against the ignorance and disinterest of key decision-makers.


How to keep your ISP’s nose out of your browser history with encrypted DNS via ArsTechnica

Taking advantage of encrypted DNS services from Cloudflare or any other privacy-focused DNS services is not as easy as changing a number in network settings.


Don’t Give Away Historic Details About Yourself via Krebs on Security

You may be inadvertently giving away the answers to “secret questions” that can be used to unlock access to a host of your online identities and accounts.


Breaches Tied to Chat Network Provider via BankInfoSecurity

A spate of payment card breaches at some of the most recognized U.S. brands has been blamed on the hacking of India-based chat network provider [24]


How to Build a Cybersecurity Incident Response Plan via DarkReading

Being hit by a cyberattack is going to be painful. But it can be less painful if you're prepared, and these best practices can help.



Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

More News