Identity Management & Cybersecurity News | 6.21.2018

Posted: 
Jun. 21st, 2018

Identity Governance and Administration (IGA) in IT Infrastructure of Today data security

Identity Governance and Administration (IGA) can be considered a very important area in the management of information technology in enterprises and organizations. The level of IGA importance can be compared to managing licenses, configurations, security incidents, vulnerabilities and other processes well described in the ITIL libraries. Moreover, although IGA is not the basic process of ITIL, its role only grows with time. Among the reasons for the increase in the importance of IGA, one can single out the increase in the role of information security and the growth of both external and internal threats, the heterogeneity and complexity of systems and software.  Read more...

 

The costs, the privacy and the security of IAM and personal data sharing

The next evolution of Identity and Access Management (IAM) is data sharing. This move will breathe new life into our personal data and make it work for its living, doing jobs for us online, and building relationships with services. We must cross a number of hurdles in terms of return on investment, security, and privacy to prepare for this new world order. We also need to build new business models that can make these personal data transaction platforms central to a larger network of services. If we get this right, we will open up a multitude of services that can benefit from the streamlining and efficiency that sharing personal data online offers.  Read more...

 

How Can Security Leaders Maintain Control of Privileged Accounts?

While it’s the security operations center (SOC) team’s responsibility to defend their environment, the team is not always in a position to remediate these issues. Given these challenges, how can security decision-makers manage and mitigate risks associated with highly privileged accounts?  Application and service users are relatively static due to their nature. Let’s imagine that a privileged identity management solution user logs in to several systems, gains some administrative login privileges, modifies a user in that host and logs off.  In a security information and event management (SIEM) tool, it would look like this.  Read more...

 

Multi-Factor Authentication Makes Digital Workspaces More Secure

If a user already presents a set of credentials (usernames and passwords) to access applications and other resources in a digital workspace, then why do you need multi-factor authentication? Credentials-based access works as long as the credentials the user presents actually belong to that user. There’s always the risk the password has been stolen—and it’s a significant risk when you consider 81% of hacking-related data breaches today are password-related.  Read more...

 

Tesla Hit By ‘Damaging Sabotage’ By Employee

If ever there has been proof of the need for better cybersecurity, this is it.  It appears that even Tesla has not completely solved this challenge.  To be clear, the challenge as laid out here likely lives in two areas – first, access governance.  Access governance is ensuring the right people have access to only the right stuff at the right time.  By ensuring those that create code can’t also insert this code into production environments, organizations can limit their risk and exposure.  Second is privileged access management (PAM).  PAM is making sure that an organization can control, audit and secure those individuals with elevated or admin access.  Read more...

 

Author Information