Identity and Access Management
472 views | +0 today
Identity and Access Management
Business-Driven Identity and Access industry news for on-premise, public cloud, and hybrid cloud environments.
Curated by Aveksa
Your new post is loading...
Your new post is loading...
Scooped by Aveksa
Scoop.it!

Identity and Access Management Buyer's Guide - Tip #1

Identity and Access Management Buyer's Guide - Tip #1 | Identity and Access Management | Scoop.it
IAM projects have a history of being long winded and costly and it usually comes down to the divide between IT and the line-of-business.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Webinar Wrap-up: Improve Security Monitoring By Leveraging User Context

Webinar Wrap-up: Improve Security Monitoring By Leveraging User Context | Identity and Access Management | Scoop.it
Identity and Access Management (IAM) can provide deep user context for Security and Information and Event Management (SIEM) solutions.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

10 Benefits of Cloud Identity and Access Management (IAM) Solutions

10 Benefits of Cloud Identity and Access Management (IAM) Solutions | Identity and Access Management | Scoop.it
Cloud IAM solutions benefit 4 key business areas including improved security, increased efficiencies, reduced costs and improved user experience.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Don't Be Afraid To Put On Your Grey Hat | SecurityWeek.Com

Don't Be Afraid To Put On Your Grey Hat | SecurityWeek.Com | Identity and Access Management | Scoop.it
Too often we get wrapped up in a “security posture” or our ten million dollar strategy when the reality is that technology just ain’t cuttin’ it.
more...
No comment yet.
Rescooped by Aveksa from InfoSec Focus
Scoop.it!

Cyberattacks on 6 American Banks Frustrate Customers

Cyberattacks on 6 American Banks Frustrate Customers | Identity and Access Management | Scoop.it
The attacks, by a group claiming Middle Eastern ties, caused Internet blackouts and delays in online banking, and the banks did not explain clearly what was going on.

Via R0CH4X, Kalani Kirk Hausman
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Compliance: The Boring Adult At The Security Party

Compliance: The Boring Adult At The Security Party | Identity and Access Management | Scoop.it
Compliance and security are not the same thing...
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

BYOD's Productivity and Security Collision Course | SecurityWeek.Com

BYOD's Productivity and Security Collision Course | SecurityWeek.Com | Identity and Access Management | Scoop.it
Companies looking to BYOD face risks related to regulatory compliance and security, but what they often don't realize is they face these problems anyway even if they lock systems down and prohibit employees from using their devices.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Unauthorized Data Access Problematic for Romney

Unauthorized Data Access Problematic for Romney | Identity and Access Management | Scoop.it
Swirling throughout the media are claims that a hacker group has managed to obtain copies of presidential nominee Mitt Romney's tax records.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

When Bad IAM Kills - Dark Reading

When Bad IAM Kills - Dark Reading | Identity and Access Management | Scoop.it
How healthcare's urgent need for single sign-on could drive better identity and access management practices across all industries...
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

On SIEM Deployment Evolution

On SIEM Deployment Evolution | Identity and Access Management | Scoop.it
Is your SIEM stuck in the past? Is it “mature”? Is it evolving? Is it solving one problem or many? Is it collecting logs or collecting dust? This post continues our journey into SIEM deployment architecture and SIEM operational processes.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

So Much Cloud, So Little Cloud Governance

So Much Cloud, So Little Cloud Governance | Identity and Access Management | Scoop.it
Considering widespread cloud applications such as Google Apps and Salesforce, many are already knee deep in cloud - whether IT knows it or not.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

3 Tips to Enhance Your Data Governance Strategy

3 Tips to Enhance Your Data Governance Strategy | Identity and Access Management | Scoop.it
With the volume of structured and unstructured data moving through our data centers, data governance is required to make sense of it all...
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Customers to Cloud Providers on Security: Here, You Handle It - Forbes

Over the past week, there has been quite a bit of coverage here on these pages to concerns about data security and privacy in the cloud.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Hackers Claim Attacks Against Imageshack, Symantec, PayPal, Other Websites

Hackers Claim Attacks Against Imageshack, Symantec, PayPal, Other Websites | Identity and Access Management | Scoop.it
Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal and other organizations.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Identity and Access Management for Your Data

Identity and Access Management for Your Data | Identity and Access Management | Scoop.it
Establishing data access policies and implementing the correct Data Access Governance (DAG) methodology is a challenge, but is a hot topic for many organizations with DLP and SIEM systems.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Business Context for HP ArcSight. When IAM and SIEM Worlds Collide.

Business Context for HP ArcSight. When IAM and SIEM Worlds Collide. | Identity and Access Management | Scoop.it
The two worlds of SIEM and IAM have collided, resulting in integrated business context for HP ArcSight customers.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

The Apple Maps Fiasco - What it would be like for IAM and Donuts

The Apple Maps Fiasco - What it would be like for IAM and Donuts | Identity and Access Management | Scoop.it
This whole Apple Maps thing still has my blood boiling. How could a company like Apple take one of the staple items from iOS and replace it...
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

BitInstant To Romney Camp: 'We'll Convert $1,000,000 USD to Bitcoin For Free.'

BitInstant To Romney Camp: 'We'll Convert $1,000,000 USD to Bitcoin For Free.' | Identity and Access Management | Scoop.it
In what appears to be a publicity stunt, a Bitcoin transfer service has offered to waive its fee for Romney to convert $1,000,000 USD to Bitcoin for free.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

5 IT Security Blogs We Love

5 IT Security Blogs We Love | Identity and Access Management | Scoop.it
There's never a shortage of things to talk about in IT security - let's cut through some of the noise and offer up a few blogs that are always on the top of our RSS feed.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

FireEye updates its Gauss blog post: 'we got it wrong'

FireEye updates its Gauss blog post: 'we got it wrong' | Identity and Access Management | Scoop.it
“The Gauss malware... is now back from its dormant state with a surprise. We recently discovered a very interesting shift in the Gauss malware CnC communication.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

5 Views On Achieving Business ROI Through Risk Management | IT security

5 Views On Achieving Business ROI Through Risk Management | IT security | Identity and Access Management | Scoop.it
Bringing value to the business through effective risk management...
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

Defining One Successful Strategy for Enterprise Security

Defining One Successful Strategy for Enterprise Security
In far too many organizations leaders and practitioners tell me that the role of Information Security is to protect the organization.
more...
No comment yet.
Scooped by Aveksa
Scoop.it!

New Gauss Exploit May Be Cousin Of Flame, Stuxnet

New Gauss Exploit May Be Cousin Of Flame, Stuxnet | Identity and Access Management | Scoop.it
A sophisticated banking Trojan, Gauss targets users in the Middle East, Kaspersky says...
more...
No comment yet.