This year has flown by, and we are excited to see what 2020 will bring! Before we look ahead, we’d like to take a look back at 2019. So, we’ve compiled a list of our top five Identity and Access Management (IAM) blog articles from 2019 just for you.
Public and highly regulated organizations require audits to ensure business is conducted in an appropriate manner. The audit process provides verification that everyone in the organization has the access they need and only what they need.
Recently, we discussed the Identity Lifecycle Management (ILM) Maturity Model, including how ILM fits into a modern identity and access management (IAM) system and benefits organizations as a whole. ILM centers around the creation of identities, taking appropriate actions for any changes, and the removal of identities across all the services and applications end users access within an organization's ecosystem.
March 23, 2019 seemed like any other Monday at Capital One headquarters. Little did employees and customers know that, over the weekend, a hacker had successfully breached Capital One’s security defenses.
As a result, more than 140,000 Social Security Numbers, 1 million Canadian Social Insurance numbers, and over 80,000 pieces of banking and credit information were stolen, along with an undisclosed number of names, addresses, credit scores, and more.
As an IT professional, you know that an M&A comes with responsibility and expectations for your team. After the deal closes and the celebration is over, you and your team are just getting started. IT plays a huge role in the merging of two companies, and with the amount of time and money that goes into an M&A, your executive team expects a successful integration.
The year has come and gone, but before we jump head first into 2019, we’re taking a look back at 2018. And this year has been busy for us! From the completion of our Multi-Factor Authentication series to our top performing Benefits of Single Sign-Onpost, which garnered huge popularity, this year has been a show stopper.
Let’s be real. Attackers are growing more and more emboldened by the day. As their tools become so simple that even “script kiddies” can use them to wreak havoc on unsuspecting targets, governing bodies are putting added emphasis on tighter regulatory compliance.
Another year, another look back at our top blogs! 2017 produced our our most read blog to-date, RBAC vs ABAC Access Control Models - IAM Explained. And from common Multi-Factor Authentication (MFA) terms and factor types to the top challenges and benefits, we also saw great readership on many of our MFA-related articles.
In enterprises around the globe, it’s becoming increasingly clear that implementing mandatory password changes is no longer considered best practice for securing key systems and data.
Of course, we’ve long known that passwords are a weak link in the security chain. Eighty percent of hacking-related breaches in 2017 leveraged either stolen passwords and/or weak or guessable passwords, according to the latest Verizon Data Breach Investigations Report.
current_page_num+2: 3 - disabled