Role-based Access Control in Large Organizations

Role-based Access Control in Large Organizations By Hanno Ekdahl  As organizations grow, their ability to accurately and efficiently manage access for their users to the systems and applications they need to be effective becomes increasingly difficult. To offset this complexity, most organizations invest in an identity management solution to automate user provisioning and provide a […]

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century By Leah Livingston By now, if you haven’t heard of OpenAI’s ChatGPT, then check out the blog that ChaptGPT wrote with us which provides a very clear definition. The chatter across industry circles has burned like wildfire on social media, podcasts, and chat forums; […]

How To Leverage Identity in An Attack

How To Leverage Identity in An Attack

Identity Access Management (IAM) has evolved from an IT efficiency play into a foundational component of enterprise security frameworks everywhere. IAM centrally manages user accounts, credentials, roles, policies, attestation/certification, and audit/reporting for all of the organization’s users and resources. Today, IAM is an essential capability that supports both security and compliance mandates; however, organizations with […]

7 Must-Read Identity Governance & Cybersecurity Articles, April 2019

Thanks for reading our biweekly roundup of Identity Governance & Cybersecurity newsbites. We curate a diverse selection of IAM, IGA, Role Based Access Control, and Identity Management articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.   Why Organizations Need an RBAC Security Model via Idenhaus In this post, we discuss why organizations implement role […]

7 Must-Read IDM & Cybersecurity Articles, December 2016

New PCI Regulations, Benefits of Identity Management, Detection vs Prevention, and Threat Intelligence Every two weeks we release a curated digest of the most interesting and informative articles covering IAM, Cybersecurity, Governance, ICS/SCADA, compliance, privacy, and more across a range of industries. If you would prefer to receive this a day earlier, please subscribe to […]