iam
Trends in IT-Security and IAM in 2021, the “New Normal” and beyond
Article by Dennis Okpara, Chief Security Architect & DPO at IDEE GmbHYes, there is hope for 2021, but the challenges of the “New Normal” are here to stay. CISOs have to prepare and ...
Oracle Strengthens Interoperability and User Experience with General Availability of FIDO2 WebAuthn Support for Cloud Identity
"Given the distributed nature of today’s technology environment, zero trust has become the standard for security. Every interaction must be authenticated and validated for every user accessing every system or application every ...
I, Robot ? Identity Rules for Robots
Robotic Process Automation plays a key role in the enterprise, executing repetitive tasks with ?bots? instead of human staff. But this technology comes with new risks ? what does that ?bot? account ...
Zero Trust Becomes a Key Factor in Managing Risk in The Digital Age
Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall among the myriad of security and risk priorities? How does it fit ...
Zero Trust Becomes a Key Factor in Managing Risk in The Digital Age
Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall among the myriad of security and risk priorities? How does it fit ...
Advanced Tips on Managing Multi-Account Setup on AWS with Terraform
In this article, we’ll discover how to use HashiCorp's popular infrastructure as code tool, Terraform in our advantage on AWS, specifically to manage multiple accounts as this is the way AWS wants ...
3 Steps to Building a Resilient Incident Response Plan
According to the Accenture State of Cybersecurity 2020 report, the average cost of a cyber attack for ‘non-leaders’ stands at $380,000 per incident. The report classifies organizations into ‘leaders’ and ‘non-leaders.’ The ...
Modern Healthcare Tech Also Means Modern Security
Modernizing healthcare infrastructure also needs to include better ways to protect data Enterprises across a range of industries have digitally transformed over the years to upgrade business operations, realize higher growth potential ...
Why understanding IAM (Identity and Access Management) Is Most Important For Better Cybersecurity
Identity Access Management (IAM) is a collective term that covers business policies, processes, technologies, and products that are used to manage user identities and regulate user access within an organization. IAM frameworks ...