9 Informative Identity Management Articles, October 2017

October 25, 2017

Stay highly informed with our biweekly Identity Management & Cybersecurity news digest. We curate the best IAM & Cyber security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

Here are 9 IAM & Cybersecurity articles to help ensure your Halloween is full of treats and not tricks.


How To Design, Choose And Implement The Right IAM Solution For Your Business via Idenhaus

Check out my new, FREE digital book entitled Re-Imagining Identity Management In The Digital World: How To Design, Choose And Implement The Right IAM Solution For Your Business.



The next revolution will be reclaiming your digital identity  via TechCrunch

Almost everything we do today leaves an increasingly digital signature. Yet this signature is scattered among different services that use it primarily for their, rather than our, benefit.



Why combining access governance with authorisation management is key to identity success via CloudTech

Gartner estimates that more than 80 percent of business information is stored in an unstructured manner. The risks associated can be devastating if the wrong person accesses sensitive information for nefarious purposes.



Finding Balance in Data Privacy  via Idenhaus

Is it possible to find a good balance between supporting businesses vs. protecting consumers’ sensitive data? We think so.


Important Blockchain Innovations Everyone Needs  via TechBullion

Blockchain has the potential to reshape the society in innumerable ways.



Context and risk aware access control via CSO

Two of the leading advances being developed in identity-centric security are sometimes called “context aware” and “risk driven” access control.


Do CISOs have a higher calling? via BlackSwanSecurity

Is cyber security now so critical to our society that we should formally and legally define the expectations, accountabilities, responsibilities, liabilities and protections for CISOs?


Carbanak Threatens Critical Infrastructure via ICIT

Carbanak, currently one of the most effective advanced persistent threats (APTs) active, poses a serious threat to critical infrastructure organizations such as banks, government, and data brokers such as Equifax.


Exclusive interview: Sailpoint talk about the evolution of identity via SecurityBriefNZ

Identity and Access Management (IAM) is becoming increasingly important for a number of reasons within large organisations and IT departments. Identity has grown through a number of innovations over the past few years, with one of the more recent ones being cloud deployments, and the use of machine learning.



Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

More News