Identity Management Blog and Articles
This identity and access management blog lists links to identity and access management articles and cybersecurity news analysis provided by Identity Management Institute which highlight the emerging issues facing the identity management industry and solutions available to IAM professionals. Please subscribe to the Identity Management Journal to receive periodic announcements and updates made to this identity management blog.
Learn Cyber Security
Lack of Training Threatens Healthcare Security
Cyber Security Certifications
IT Security Courses
Using Mobile Device Management for Security
Solving Healthcare Cybersecurity Challenges
Emerging Security Threats and Technological Innovations
API Security and IAM Risks
Identity and Access Management for Cloud Security
Security Challenges of Remote Workforce
Vendor Neutral and Vendor Specific Certification
Identity Management (IdM) System Implementation Considerations
This article explores important considerations for implementing IdM systems such as implementation processes, role-based access management model, and existing IAM services for processing and managing user access.
Identity Management Use Cases
Identity and access management architects can benefit from the following identity management use cases to improve Identity, Credential, and Access Management (ICAM) practices within their organizations.
In a rapidly evolving digital world where blockchain technology is being adopted to redefine identity and access management, self-sovereign identity is no longer a distant dream to ensure privacy and consumer protection.
IAM Certification Courses – Identity Management Blog
IAM courses are among the most popular courses in cybersecurity due to heightened awareness about the importance of identity and access management in enterprise security. Learn more.
The Evolution of Authentication
The increasing complexity of systems is leading to a need for more secure authentication methods. Although passwords are a ubiquitous form of verification, allowing users to access applications and perform actions within a system, there have always been problems with this method which raise the password-less solutions.
10 Popular Email and Phishing Scams
This article is published to list the 10 popular email and phishing scams that are used to scam consumers and businesses.
Lessons Learned from the SolarWinds Hack
There are many lessons learned from the SolarWinds hack that companies can embrace to prevent future attacks and protect they systems.
Identity and Access Management Threat Predictions for 2021
To stay ahead of the market and manage the evolving threats, both businesses and IAM professionals need to understand the changes that will occur in 2021.
Hacked Cybersecurity Systems and Stolen Security Data Risks
A stunning cyber attack on FireEye security tools makes cybersecurity experts assess the impact and risks of hacked security systems and stolen security data.
Customer Identification and Identity Verification Methods
There are legal requirements for customer identity verification that businesses must comply with their “know your customer” and customer identification programs.
Selecting Identity and Access Management Software
Selecting identity and access management software can be challenging. Learn to properly assess your needs and techniques to engage vendors and select software.
Managing the Advanced Persistent Threat (APT) Lifecycle
Managing the Advanced Persistent Threat (APT) lifecycle begins with knowing the typical APT lifecycle and applying the right mitigation strategies at each phase.
Improving Identity Management With Advanced Threat Protection (ATP)
Improving identity and access management is an important goal of Advanced Threat Protection (ATP) because most data breaches occur due to unauthorized access.
Privacy Implications of Using Facial Recognition Systems
While facial recognition systems offer clear benefits to businesses and government agencies, they present one of the biggest threats to consumer privacy.
The Cybersecurity Risks of Outsourcing to Third Parties
Outsourcing to third party service providers presents serious cybersecurity risks which must be managed properly to avoid the consequences of data breach.
Blackmailing With Stolen Private Information
Blackmailing with stolen private information is common. Use these tips to avoid being blackmailed and properly respond to blackmail and extortion threats.
Importance of Layered Security in Cyber Defense
Layered security recognizes that there is no single point in a computer system that can ever be fully secure. Therefore, layered security seeks to implement multiple mitigating layers of protection so that intruders have to break through many security measures at the same time.
Authentication in an Internet Banking Environment
Authentication in an Internet Banking Environment is only one of many safeguards that have been introduced to protect the clients of financial institutions.
Data Loss Prevention (DLP) Best Practices
Data Loss Prevention encompasses various approaches, processes, and tools to protect sensitive data from unauthorized changes, destruction, sharing, theft, and loss.
Security Risks of Distributed Blockchain Applications and Data Storage
With the introduction of distributed blockchain applications or dApps and distributed cloud data storage, the cybersecurity and data breach risks may evolve.
Technical Identity and Access Management Practitioner Duties
Technical identity and access management practitioners are in high demand as the IAM industry grows. This identity management blog article covers the IAM practitioner job duties.
Identity and Access Management in Decentralized Finance
Best practices in identity and access management are critical in decentralized finance to protect the crypto wallet credentials and DeFi financial transactions.
Cryptocurrency Wallet Scams – Identity Management Blog
Cryptocurrency wallet scams are on the rise and hackers are targeting individuals and wallet providers. Consider these important points to minimize risks.
Identity and Access Management Job Descriptions and Salaries
Identity and access management is a growing field and offers many job opportunities. This identity management blog article describes some of the most common IAM jobs and salaries.
Identity and Access Management Job Interview Questions
If you are preparing for an identity and access management job interview, this identity management blog article covers the common IAM job interview questions that IAM candidates face.
Privileged Account Management Best Practices
Privileged accounts pose a great security threat and must be managed differently than other accounts to prevent data breach and unauthorized transactions.
Dealing With Ransom Demands By Hackers
Cyber criminals steal files and demand a ransom for the decryption key in ransomware attacks. How should organizations deal with the ransom demands by hackers?
Cybersecurity and Data Protection Considerations for Remote Workers
As organizations increasingly allow their employees to work remotely, This identity management blog article lists cybersecurity and data protection considerations for remote workers.
Global Cybersecurity Expert Shortages
It is estimated that global cybersecurity expert shortage is around 1.5 million in 2020 and more than 3.5 million cybersecurity jobs will be unfilled by 2021.
Building a Robust Identity and Access Management Team
There is a need for identity and access management teams and experts. Identity Management Institute helps identity management professionals get certified and companies get the talent they need to build robust IAM teams.
Is Identity and Access Management Part of IT or Cybersecurity?
As organizations increasingly establish IAM teams, many IAM experts question whether the Identity and Access Management function is part of IT or Cybersecurity.
Cloud Access Security Broker (CASB) For Cloud Security
Cloud Access Security Broker (CASB) is a cloud security solution that helps organizations control access, reinforce policies, and protect data in the cloud.
Biometric Authentication for Better Security
Many companies transition to biometric authentication for better security as it helps to keep hackers at bay and users happy when they access systems.
Why to Switch to Fast Identity Online (FIDO) Authentication
The Fast Identity Online or FIDO standard is a joint development by the world’s leading technology companies which try to strengthen the security of systems, mobile devices and applications through strong password-less authentication.
Cyber Attack Methods on Internet Availability
Although the prospect of “bringing down the whole Internet” is enticing, hackers shifted tactics toward crashing networks of businesses and governmental entities.
Zero Day Security Vulnerability Management and Exploit Prevention
Zero day attacks take advantage of security flaws in a program that developers either don’t know about or have not yet addressed. Learn about zero day attack prevention and incident response.
Internet Infrastructure and Disruption Causes
An imminent cyberattack on the Internet and online communications is one of the causes for internet shutdown which can lead to disruption to communications, and system damage.
Facing the Unique Challenges of Customer IAM
Companies dealing with consumers face challenges in the area of identity management which requires a balanced approach on data security and user experience.
Managing Insider Threats with a Zero Trust Access Model
Insiders pose a greater security risk to an organization’s systems and data. Insider threats can be managed with a zero trust model and multi-layer security.
Privileged Account Management (PAM)
As the number of systems, users, and data grows, the need for a robust identity and access management solutions and experts becomes even more important to manage accounts and their access. Specifically, privileged accounts which offer the highest level of access to a system are prime hacking targets.
5 Identity and Access Management Best Practices
Identity and access management (IAM) is a critical component of a successful protocol and requires the implementation of best practices to maintain the integrity of user and device identities.
Global Internet Interruption will Cause Worst Economic Crisis
An extended global Internet interruption will cause even a bigger economic crisis than Corona virus leading to financial sector meltdown, business bankruptcies, mass layoffs and unemployment, and many other unforeseen consequences never witnessed before.
Technology Project Management Best Practices, Challenges, Styles, and Skills
Project managers in the technology industry must use and adopt best practices in project management and have the skills to overcome project challenges.
The California Consumer Protection Act (CCPA): 2020 Business Guide
California Consumer Privacy Act (CCPA) regulation applies to companies and organizations doing business in California that meet certain data management criteria.
Cloud Security and Access Management Concepts
As more data and applications move to the cloud from traditional systems, it becomes paramount for businesses and their management to secure their data from threats and attacks as they store, process, and access their data in the cloud.
KAGE Data Protection Framework
KAGE is a data protection framework developed by Identity Management Institute to offer a simplified information security framework for the CDP® certification.
CARTA, Zero Trust and the Future of Adaptive Risk Management
Extensive networks with diverse user bases require identity management and access control measures capable of executing adaptive responses to dynamic user interactions. The CARTA framework introduced by Gartner offers one such solution.
Dealing with Ransomware Pirates
Recent study suggests that ransomware attacks are on the rise and ransomware victims must carefully decide how to proceed when dealing with ransomware pirates.
Ransomware Attack Prevention and Response Solutions
The security tips discussed in this identity management blog article offer ransomware attack prevention and response solutions to help organizations keep their information assets safe.
Understanding and Using Hyperledger for Blockchain Identity Management
The Hyperledger project offers businesses many powerful identity and access management tools and features with granular user access and data privacy controls.
Identity of Things Challenges in IoT Identity Management
For Internet of Things, we must be prepared to address IoT identity management needs for self-service, identification, ownership, access rights, and tasks.
From IAM to Customer IAM: 7 Basic Tenets of CIAM
These seven core Customer Identity and Access Management – CIAM principles serve as guides for businesses seeking the best customer system security solutions.
Identity and Access Management Purpose and Objectives
The identity and access management purpose is to support the overall cybersecurity objectives of an organization. As such, identity and access management objectives are to ensure confidentiality, integrity, and availability of systems and data.
Using IAM to Support Regulatory Compliance in Cybersecurity
Using identity and access management for cybersecurity regulatory compliance requires a solid framework for managing user identity and controlling data access. Learn about 5 regulations which can be supported by identity and access management for compliance.
Polymorphic Malware: Best Practices for Responding to a Growing Threat
Known as polymorphic malware, these malicious programs must be detected and eradicated to prevent widespread data compromise. Learn about polymorphic malware security and protection best practices.
What Impact is COVID-19 Having on Cybersecurity?
With increased remote workforce due to Coronavirus, businesses face continued challenges associated with COVID-19 which is having an impact on cybersecurity.
Shortcomings in Cybersecurity Risk Management
Every company concerned with protecting its systems and information must also be concerned with shortcomings in its cybersecurity risk management efforts. Learn about these shortcomings.
Integrating Cyber and Physical Security For Better Access Management
Integrating cyber and physical security is necessary for better access management and requires actionable plans for policy enforcement to address access risks.
Access Control Types and Models
Access control types and models are designed to allow, deny, limit, and revoke access to resources through identification, authentication, and authorization. Learn more about these concepts.
Executive Assistant Superpowers
Executive assistant superpowers should not be underestimated when considering the level of access that some executives have and share with their assistants.
Cybersecurity Considerations for Remote Workers
Adopting a remote work policy requires careful considerations of cybersecurity implications for remote workers to avoid placing your business at a disadvantage.
Why Some Executives Abuse Power and Override Security Policies
Corporate executives have in general more power than others in an organization and some of them abuse their power and override security controls with or without malicious intention.
Identity and Access Management Challenges
There are many identity and access management challenges facing organizations and their staff which are introduced by changes in our way of life, technology and threat landscape.
Information Security Outsourcing Risks and Solutions
Information security outsourcing presents certain risks that companies must manage. As more companies decide to outsource certain aspects of their identity management and security services, they must take responsibility for managing their security service providers.
Should You Consider IAM Certification?
Pursuing identity and access management or IAM certification has the potential to improve your career as an IT specialist or cybersecurity professional.
Identity Management and Cybersecurity News Update
From Coronavirus cyber threats to ransomware blackmail, blockchain identity management and zero trust, this identity management article lists the latest IAM and cybersecurity news.
Identity Theft Red Flags Rule Examination Procedures Checklist
These identity theft audit procedures will be followed by government examiners to ensure compliance with the Red Flags Rule and can be used by companies as a checklist to assess their compliance level and preparedness for an eventual audit.
26 Red Flags for Preventing Identity Theft
The US government has identified 5 categories of identity theft red flags and a total of 26 specific red flags as part of the Red Flags Rule regulation that businesses must use to develop an identity theft prevention program.
Are Biometric Data Breaches a Real Security Threat?
With growing adoption of biometric technology, there is a growing concern that biometric data can be stolen and used to gain access to data with far more permanence than a password.
Business Outsourcing Myths and Risks
There are certain business outsourcing risks and myths around the benefits when companies decide to let another company take care of their business operations.
Key Characteristics of Identity and Access Management Solutions [Business Guide]
Identity management is an essential component of modern enterprise security. Check out these key characteristics of identity and access management solutions.
Blockchain Identity Management for Security and Privacy
There are clear signs that future business solutions for security and privacy will include blockchain identity management but new challenges must be addressed.
Information Security Program Implementation Guide
This identity management article summarizes the government information security program implementation guide under NIST 800-100 and the minimum security requirements per NIST 800-53.
Artificial Intelligence Has its Perks, But it’s Not a Panacea
Sophisticated artificial intelligence solutions can be used to improve security but companies must mitigate artificial intelligence threats and security issues.
Enterprise Cybersecurity Best Practices: Creating an Information Security Policy
Security should be a priority for companies and cybersecurity policy best practices must be considered in security management including clear instructions.
Mergers, Breach Protection and Government Cybersecurity
In response to changing cybersecurity trends, businesses and government cybersecurity still struggle to protect their systems from hackers or insider threats.
Strategic Access Management Protects Smart Buildings From Siegeware
Updated and adequate access management policies and practices can help protect smart buildings from siegeware attacks and prevent ransomware and financial loss.
Third Party Security Risk Management Best Practices
The complex inter-connectivity between enterprises and their vendors requires diligence and application of third party security risk management best practices.
Is Adaptive Authentication the Solution for Modern Identity Management?
Adaptive Authentication is a risk-based authentication method used to grant entities access based on various risk factors such as user role and behavior.
2019 Cybersecurity Roundup and 2020 Predictions
Kick off the new year by taking stock of the 2019 cybersecurity events and preparing for new challenges by considering identity management predictions for 2020.
Onboarding Best Practices to Mitigate Insider Threats
The lack of user awareness places companies at significant risk for breaches resulting from ignorance and errors. Proper onboarding techniques are necessary to educate employees and reduce the likelihood of insider threats from day one.
Digital Identity Transformation – Identity Management Blog
Identity Management Institute has introduced a framework for “Digital Identity Transformation” which is the holistic assessment and improvement of business processes, people, and technologies to achieve the identity management excellence, system security, data privacy, and regulatory compliance objectives of an organization.
Is Your Enterprise Making These Critical Identity Management Mistakes?
92% of IT and security professionals face “at least one challenge” which can lead to making critical identity management mistakes and data breach incidents.
Insider Threats to System and Data Security
The best approach to manage insider threats to system and data security is for companies to incorporate as many concepts and best practices described in this identity management blog article into their overall cybersecurity strategy.
Smart Homes, Smart Buildings, Smart Cities
With the number of connected devices projected to increase, smart homes, smart buildings and smart cities add to IAM challenges in the modern IoT landscape.
Exploring Authentication Options for Better Security
The increasing complexity of the cybersecurity landscape has rendered traditional passwords all but useless, and a nuanced approach to access management is necessary to protect against emerging threats.
Dangers of Security Policy Override and Violations
Executives and management team members like all other employees should not be exempt from following any of the company’s security policies and procedures in order to ensure continued protection of company assets including confidential information.
Security Challenges and the Future of the IAM Market
The digital landscape is always changing, and projections suggest identity and access management (IAM), cloud services and updated security models will be key considerations for 2020.
Improving Identity Theft Prevention with Machine Learning
Making Machine Learning a primary tool in identity theft prevention helps safeguard businesses against inevitable attacks and preserve the identities of all users with network access.
IAM Certification Types and Benefits
Identity Management Institute offers various types of IAM certifications to its members and customers in order to confirm certain assertions and qualifications.
6 Tips for Selecting an IDaaS Solution
These six questions can guide enterprises to evaluate security, functionality and adaptability for selecting an IDaaS vendor for diverse access requirements.
Reasons Why You Need to Upgrade Your IAM Systems
In light of changing access needs and the complexity of modern threats, IT teams must examine existing systems for signs of obsolescence and take steps to implement solutions with features designed to support modern access needs.
Why Identity and Access Management is Important
This identity management blog article lists a few reasons to demonstrate why identity and access management is important to the cybersecurity, data protection, and privacy industries.
Artificial Intelligence For Data Breach Prevention
Leveraging artificial intelligence for data breach prevention requires a detailed security plan, tools and the help of a qualified IT team to execute the plan.
Overview of Identity Theft Companies
As consumers look for identity theft help, they must assess and select the best service provider. This identity management article provides an overview of some identity theft companies and how companies can differentiate themselves from the crowd with a product certification.
How Artificial Intelligence and Machine Learning are Transforming IAM
Companies are turning to artificial intelligence and machine learning for IAM transformation and improved identity and access management practices and security.
LDAP Authentication Management Best Practices
The Lightweight Directory Access Protocol (LDAP) provides database access control but can present security problems if proper administration is not followed.
Identity Theft Company Certification
Identity theft companies are encouraged to undergo a voluntary product certification process in order to showcase their services and the “Certified Product” badge. The certification report will answers many of consumers’ questions upfront and help gain their trust.
Improving Security to Future-Proof Enterprise Cloud Environments
Monitoring the trends in cloud security can guide enterprises to best practices for protecting users, identities and data in the cloud. Preparing in advance for changes in cloud use and technology equips businesses to handle attacks and avoid catastrophic breaches.
IAM Best Practices in Changing Environments
When planning for the future, identity management professionals must consider continuing changes in data privacy and security regulations and take into account the evolving nature of enterprise systems.
Complex Cyberattacks Require Improved Security
In light of frequent and complex cyberattacks, predictions for the coming years suggest an aggressive and proactive approach to security is necessary to manage network access.
Security and Privacy Risks of Biometric Authentication
Businesses considering biometric authentication as part of their strategy must consider the potential security and privacy risks of biometric authentication. What can businesses do to protect biometric data going into 2020?
Brazilian General Data Protection Law
Organizations need to understand the impact of the Brazilian General Data Protection Law or LGPD which is Lei Geral de Proteção de Dados in Portuguese in the context of current data protection regulations for compliance.
6 Reasons Why Data Privacy is Dead – Identity Management Blog
Privacy has diminished due to the emergence of new technologies, users’ irresponsible attitudes, frequent data breaches, companies’ willingness to profit from data sharing, and government spying.
7 Password Attack Methods Hackers Use
In many cases, passwords can be guessed using common phrases such as “password”, other times, hackers may rely on one of the attack methods in this identity management blog article.
2019 Could Be the “Worst Year” For Data Breaches – Can New IAM Trends Help?
With 2019 set to be one of the worst years in history for security incidents, IT and cybersecurity experts need to consider how new trends in identity and access management (IAM) may provide added protection for sensitive data against an ever-increasing range of security threats.
Ways to Learn Cyber Security – Identity Management Blog
The shortage of qualified cybersecurity professionals must come as a good news to new entrants and those in related technology fields to learn cyber security.
Lack of Knowledge and Training Threatens Healthcare Security
Although healthcare organizations handle a great deal of highly sensitive personal information, new reports show a troubling lack of awareness and training in the areas of security regulation and policies in U.S. and Canadian institutions.
Cyber Security Certifications – Identity Management Blog
Cyber security professionals need to consider cyber security certifications to improve their skills, advance their career, and gain a competitive advantage. This identity management blog article provides further details about various cyber security job titles and roles.
Edge Computing: More Secure, or a Security Nightmare?
Edge computing brings computer tasks closer to data sources, either enabling execution within devices themselves or outsourcing to local servers and data centers instead of central locations.
Overview and Benefits of IT Security Courses
IT security courses are essential for students and employees whether they help manage a security program or must apply security when using and handling systems.
Using Mobile Device Management for Secure Network Access
MDM acts as an important component of mobility management and is quickly becoming a necessary companion to identity and access management (IAM) for businesses where BYOD is a necessity or remote employees make up a significant portion of the workforce.
Can Better Access Management Solve Healthcare Cybersecurity Challenges?
Protected Health Information (PHI) consisting of personal details, medical histories and other health related data is highly attractive to hackers, but many healthcare organizations lack the robust security protocols required to guard against cyberattacks and need help implementing better access controls.
Emerging Security Threats and Technological Innovations
This identity management blog article highlights the latest events and trends to demonstrate how emerging threats and technological innovations are changing the security landscape.
API Security and IAM Risks – Identity Management Blog
Application Programming Interface (API) gives access to valuable information and this identity management blog article provides an overview of the API security and IAM risks as well as ways to mitigate the risks.
Identity and Access Management for Cloud Security
Identity and Access Management (IAM) is considered one of the most effective ways to provide cloud security. This identity management blog article analyzes why the Identity and Access Management domain is the most significant control for data security in cloud environments.
Facing the Unique Security Challenges of a Remote Workforce
Companies offering remote work opportunities in response to the growing demand face security challenges unique to managing a mobile workforce and must respond accordingly to prevent unauthorized network access.
Vendor-Neutral and Vendor-Specific Certification Benefits and Differences
When it comes to professional IAM certifications, many members of Identity Management Institute (IMI) ask themselves which IAM certification they must pursue for career growth and learning. Another important question that they pose themselves is what are the differences and benefits of vendor-neutral versus vendor-specific certification?
Is Facebook’s Libra Currency the Next Threat to Privacy?
Facebook’s announcement of its upcoming cryptocurrency launch is making some lawmakers and security experts uneasy. Dubbed “Libra” and slated to debut in 2020, the currency has the potential to threaten privacy on a global scale unless regulatory action is taken to minimize the risks to consumers’ data and identities.
Top Security Concerns of Blockchain-as-a-Service (BaaS)
As with all “as-a-service” offerings, the responsibility for security in Blockchain-as-a-Service (BaaS) falls to the provider. Businesses considering BaaS must evaluate the potential known vulnerabilities of BaaS providers and how blockchain vulnerabilities could affect their security.
Challenges in IAM Practices and Cybersecurity Standards
Cybersecurity remains a top concern for anyone handling sensitive information, but recent incidents and study results indicate an alarming lack of understanding regarding the importance of access control and unified security management.
Exploring the Implications of the Blockchain for Healthcare Data Security
Emerging blockchain technology may offer a solution to healthcare’s biggest security challenges. Features such as decentralized storage, cryptography and smart contracts provide a framework for organizations to improve data protection while maintaining accuracy and preventing unauthorized access to or alteration of patient information.
Security Risks of Increasing Enterprise Voice-Enabled IoT Adoption
Voice-enabled internet of things (IoT) technology presents certain security risks with the increasing use of in-home smart speakers and other enterprise devices.
Identity and Access Management Jobs and Career Path
Technical IAM experts need to understand the risks in order to design better products and non-technical IAM specialists need to understand best practices in order manage systems and projects, or improve processes to counter the emerging threats.
Biometric Authentication: Safe Solution or Major Security Risk?
Often used alone or as part of multi-factor authentication protocols, biometric data is seen as a more secure alternative to traditional passwords. However, concerns about potential vulnerabilities are beginning to arise as the use of biometrics becomes more prevalent.
What Can We Learn From Massive Data Breaches?
Despite increased efforts to improve security and prevent hacking, major sites continue to become the targets of global hackers. What do these breaches teach us about modern cybersecurity, and what can be done to minimize future risks?
How KYC Affects Customer Identity Management
Among regulations is the “know your customer” (KYC) process, which may directly affect how institutions handle identity management.
Is AI the Future of Cybersecurity for Businesses?
AI represents the next frontier in security and access management and Artificial Intelligence will transform cybersecurity as the industry confronts threats.
CIPA Certification: What It Is, and Why You Should Pursue It
The Certified Identity Protection Advisor (CIPA) designation is for professionals who educate, guide, and support consumers with their identity theft solutions.
Trends, Breaches, and the Changing Face of IAM
Evolving cybersecurity concerns impact every organization handling sensitive personal data. The latest trends in identity and access management (IAM) point toward a cloud-based future where the concept of a “user” becomes more and more flexible.
Identity and Access Management Standards
Common identity and access management standards handle user requests for access to data or applications and deliver responses based on the information a user provides. Get the the list of common IAM protocols.
Employee Errors Cause Most Data Breaches
Employees often fall victim to phishing and social engineering attacks which result in compromised system access. Employee errors cause most data breaches.
Decentralization and the Blockchain: A Smarter Approach to Identity Theft Protection?
Blockchain technology could improve identity management through identity decentralization with a single, user-controlled set of integrated identifiers to help prevent identity theft.
Biometric Trends and the Next Generation of IAM
Biometrics are growing in popularity as an alternative to less secure forms of authentication and are gaining wider acceptance among consumers and employees.
The Evolution of Identity and Access Management
Understanding what the future holds makes it possible to implement proactive defenses against potential breaches, stay ahead of new hacking tactics and preserve the integrity of complex modern systems.
Digital Twin Technology Benefits and Challenges
IT professionals must be aware of the potential digital twin technology benefits and challenges and its security risks so that companies can benefit from the technology without placing systems, products or end users at risk.
Should You Be Worried About Hivenets?
The very same artificial intelligence (AI) tools companies use to improve their business can enable hackers to increase the reach and magnitude of breaches. Hivenets are one of the most potentially devastating developments to arise from the malicious implementation of AI.
Why We Should Be Concerned About Crime-as-a-Service
This business of selling the tools of the cybercrime trade, dubbed crime-as-a-service (CaaS), should be on the radar of every IT and cybersecurity professional.
Why Employees Need Cybersecurity Training
The increasing number of cyber attacks and lack of solutions such as zero-day vulnerabilities are some of the reasons why employees need cybersecurity training to improve counter measures, reduce the risk, and minimize the damage.
Using Artificial Intelligence in Cybersecurity
By incorporating and using Artificial Intelligence in cybersecurity products, the industry is aiming for faster and more accurate decisions making regarding threats and data breach incidents.
Access Management, Breach Detection and Privacy Regulations
Trends in access management, breach detection and privacy regulations affect IT and cybersecurity professionals across industries. Here’s what you need to know to help your business or organization stay on top of emerging threats and meet changing compliance requirements.
State Sponsored Cyber Warfare
State sponsored hacking and state sponsored cyber attacks affect targeted countries and their people in many ways including loss of privacy, data theft, weakened national security, and infrastructure shutdown.
The Rise of Mobile Biometrics – Identity Management Blog
The current move toward passwordless authentication requires innovative access solutions, and mobile biometrics is emerging as one potential option to address the vulnerabilities associated with traditional login methods.
Identity and Access Management ROI
Although initial IAM implementation requires investing time in assessments and audits, purchasing new tools and infrastructure, and reworking security policies and procedures, the identity and access management ROI and operational benefits of an IAM solution are worth the effort.
Identity Management Consultant Tasks and Duties
This identity management blog article describes the identity and access management job duties and tasks. Identity management professionals must consider these IAM skills in the resumes.
Future Trends in Digital Identity Management
Adopting a “zero trust” model is one of the future trends in digital identity management in which insiders and outsiders are treated as equal levels of risk.
Federated Identity Management Challenges
Adoption of federated identities is increasing among businesses and can have particular benefits at the enterprise level. By creating one central identity to access all network applications, companies simplify workflows and remove barriers to productivity. However, a unique set of security challenges must be met when using federated identity technologies.
Identifying, Managing and Preventing Access Creep
Privilege or access creep is a system security risk which occurs when employees accumulate more access rights than are required to perform their job tasks.
Your IAM Strategy is Terrible, and Hackers Love It
Continued reliance on outdated IAM methods is one of the biggest problems with system security. This identity management blog article explores the latest threats and IAM solutions.
The Deep Trouble with Deepfakes – Identity Management Blog
Improvements in artificial technology (AI) and machine learning (ML) could soon make flawless deepfake videos that can potentially undermine security everywhere.
Managing Vendor Onboarding Challenges
To keep your company data safe, it’s essential to follow a consistent process for managing vendor onboarding challenges and their access during the partnership.
Identity and Access Management in Cloud Platforms
As more businesses invest in cloud platforms, it will be increasingly necessary for executives and their IT departments to develop appropriate identity and access management (IAM) policies designed to address the emerging concerns.
Sarbanes Oxley Access Management Requirements
Sarbanes Oxley (SOX) may necessitate changes in identity and access management (IAM) policies to ensure your company is meeting the requirements related to financial records integrity and reporting.
Malware Remains Most Popular Attack Method
Malware is still the most popular form of cyberattack and can be used to steal credentials for use in more sophisticated or extensive breaches.
Mitigating the Growing Risk of Identity Theft
Business owners must recognize the growing identity theft threat to their companies, employees and customers and take steps to mitigate the risks and ensure personal data stays out of the hands of malicious third parties.
Artificial Intelligence in Information Security
Information security teams should leverage Artificial Intelligence (AI) and Machine Learning (ML) assets because they are better at detecting unusual behavior anywhere on a system and can trigger immediate responses to arrest a threat before it turns into a full-blown breach.
It’s Time to Put the Nail in the Coffin of Knowledge-Based Authentication
The public records used as the basis for dynamic KBA are like an open book to anyone who knows the types of information necessary to answer common security questions. With increasing breaches, it may be time to consider adopting a better method.
Understanding the Future of Identity Governance: The Advent of the Cloud
A new generation of identity and access management (IAM) practices is emerging to handle growing security concerns. Although many businesses already use a form of identity governance and administration (IGA) to handle the details of IAM, it’s time to consider following the cloud trend and adopting cloud-based IGA for better administration of identities and permissions.
Adopting Multi Factor Authentication
If you’re currently using passwords or any other single-factor authentication method, switching to multi-factor authentication (MFA) may be the logical next step to boost data security.
Managing Temporary Worker Access
Hiring temporary employees and contract workers can be helpful when you need to outsource a business task no one on your permanent staff has the time or abilities to address, but this approach has risks when it comes to data security.
Call Center Employee Fraud Training
Incidents of call center fraud are on the rise according to various call center fraud reports. This is partly due to the migration of scammers from online channels, where breaches are becoming more difficult to commit, to the largely unprotected and vulnerable environment of call centers.
Biometric Authentication Challenges
The security industry recognizes that most system hacks occur due to poor password management as many people use weak passwords or the same password to access multiple accounts. That said, the security industry is offering other solutions like biometric authentication to improve security, but will they?
Employee Offboarding: 6 Essentials to Keep Your System Safe
Companies failing to follow proper employee offboarding measures are at risk for data loss, cyberattacks and other malicious activities. Regardless of the reason for an employee’s exit, offboarding is an essential part of the transition process. Protect your system and all sensitive data with these six critical identity management procedures.
The Role of Identity Management in Data Governance
Because data governance is mainly about data and access management, the identity and access management team ensures accountability through the implementation and documentation of certain security protocols. Learn about data governance.
In the Ever-Changing IoT Landscape, Things Now Have Identities
With the number of connected IoT devices set to reach 75 billion by 2025, having a strong identity and access management (IAM) policy is more important than ever to deal with identity of things (IDoT) and internet of identities (IoI).
6 Best Practices for Managing the Identity Lifecycle
With constant changes in technology and the dynamic nature of employees’ access needs in the modern workplace, it’s essential to follow these Identity and Access Management best practices throughout the employee lifecycle.
Identity and Access Management Protocols
Identity and Access Management (IAM) protocols are designed specifically for the transfer of authentication information and consist of a series of messages in a preset sequence designed to protect data as it travels through networks or between servers.
Credit Report Review Guide – Identity Management Blog
Careful monitoring of credit reports can alert consumers to fraudulent activities or inaccuracies in records potentially indicating identity theft. The review and error correction process can also help improve the credit score.
Self Driving Car Security – Identity Management Blog
The self driving car security has clearly become a priority for car manufacturers, car owners, lawmakers and regulators as tech giants from Apple to Google to Tesla throw their considerable weight behind fully autonomous vehicles which are expected to hit the market very soon.
Internet of Things Security – Identity Management Blog
As the number of connected devices in homes, offices, public institutions and industrial frameworks increases, so does the need for better Internet of Things security. Each new IoT device and network introduces more points of vulnerability, and it’s time for cybersecurity experts to update their skills to meet and counter the latest threats.
Access Certification – Identity Management Blog
Access certification is the validation of access rights within systems which is a mandatory process for compliance and security risk management. Access certification can be a very daunting process for some organizations with dispersed systems, workforce, and partners. This identity management blog article discusses the certification process and solutions.
Distributed Information Security Management Model (DISMM)
Information security is the responsibility of everyone in any organization. Distributed Information Security Management Model or DISMM ensures security accountability across the enterprise.
Identity Theft Certifications Explained – Identity Management Blog
Identity theft certifications issued by Identity Management Institute offer professional credibility, knowledge, employment opportunity, and career advancement. Learn about their scope and differences.
Identity Theft Prevention Program Certification
Identity Management Institute offers an Identity Theft Prevention Program certification service as part of its global and independent solutions.
General Data Protection Regulation (GDPR)
This article serves as a high level overview of the GDPR and its key requirements that companies will need to comply with and ensure their proper implementation to meet their compliance obligations.
Self Service Identity and Access Management
Self service identity and access management is increasingly embraced by users and companies and it is a matter of time before it’s widely adopted due to the many benefits it offers.
Identity and Access Management Vendor List
The Identity and Access Management vendor list includes strong contenders in the IAM technology and software space.
Identity and Access Management Solutions Providers
Identity and Access Management solutions providers offer various IAM solutions to help businesses manage user identities and their access to systems securely. This page lists all major identity and access management companies in the technology space.
Identity and Access Management Certifications
The fastest growing professional certifications in cyber security are the Identity and Access Management certifications which have received industry attention. Learn more about IAM certifications.
The Principle of Least Privilege – Identity Management Blog
When someone’s access is beyond that person’s required access to perform their job duties, then that access is considered to be beyond the principle of least privilege.
AAA Identity and Access Management Model
The AAA identity and access management model is a framework which is embedded into the digital identity and access management world to manage access to assets and maintain system security.
The Future of Identity and Access Management
The future of identity and access management will include technological innovation to address the security and interoperability of increasing connected devices.
Identity and Access Management Market Analysis
This identity and access management market analysis highlights the fast growth of the IAM market and drivers which fuel demand for identity and access management solutions.
Identity Management Blog and Newsletter
The free identity management blog articles on this identity management blog are original identity and access management articles which are accessed by thousands of monthly global readers through Identity Management Journal.
Employee Password Risks and Password Alternatives
According to a few research studies, stolen employee access password is by far the leading cause of system hacking cases and data breach incidents.
The Future of Cybersecurity – Identity Management Blog
The future of cybersecurity is as clear as it is obscure. This identity management article discusses factors affecting cybersecurity such as threats, expanding risks, and shortages in cybersecurity talents.
New Cybersecurity Challenges – Identity Management Blog
Due to the global Internet connectivity of many devices and networks, the computer security risk landscape has expanded and includes many new cybersecurity challenges.