7 Must-Read IDaaS, Cybersecurity, and PAM Articles, February 2019

idenhaus-consulting-biweekly-idaas

Thanks for reading our biweekly digest of Cyber security and Identity Management articles. We curate a diverse selection of IAM, IDaaS, Cybersecurity, and RBAC articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.

This week’s news digest includes 7 informative IDaaS, PAM, and identity management articles from late February 2019. Enjoy!

idenhaus-rbac-webinar

 

Reducing Your Legal Exposure After a Cybersecurity Incident via Idenhaus

While most organizations have a plan for incident response, few consider how their actions during a response affect their legal exposure. Here are 5 mistakes companies make following a cybersecurity event that significantly increase their legal exposure.

Why do PAM projects fail? Tales from the trenches via ITProPortal

Most enterprises have implemented some form of Privileged Access Management, but many find these initiatives fail to live up to expectations.

4 Key Facts About IDaaS, Cloud Identity, and Digital Transformation via SolutionsReview

IDaaS may not prevent all of your cloud identity issues but it will make undergoing a digital transformation far easier than ever before.

Use an 8-char Windows NTLM password? Don’t. Every single one can be cracked in under 2.5hrs via The Register

HashCat, an open source password recovery tool, can now crack an eight-character Windows NTLM password hash in less time than it will take to watch Avengers.

Executive View: Privileged Access Management via BankInfoSecurity

Download this research report and learn how advanced privileged management capabilities will help you prevent: Hijacking of privileged credentials by cyber-criminals; Abuse of privileges on third-party systems; Accidental misuse of elevated privileges by users.

Which RBAC Approach Is Better: Top-Down or Bottom-Up?  via Idenhaus

Creating an Identity & Access Management (IAM) roadmap is an important first step in helping your organization reap the full benefits of its IAM investment, as well as driving organizational understanding and support.

How to Effectively Use Role-Based Access Control in the Real World [WEBINAR]  via Idenhaus

In this webinar, you will learn how to balance managing the complexity of RBAC and delivering value to the business effectively.

 

Check out our previous digest of Identity & Access Management articles here: 9 Must-Read Cybersecurity, Privacy, and IAM Articles, February 2019

 

An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top