IAM (Identity and Access Management) often gets overlooked when laying out a security strategy for an organization. It is often assumed that LDAP controls and password policies will meet the needs of access management. But as organizations grow, so do their user bases, both in complexity and diversity. Often identities begin to fall into multiple silos including employee, customer and vendor. Managing and monitoring identities across all of these silos is quickly becoming a fundamental need as organizations work to stem the tide of criminal threats against PII.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page