Filter By:

Recent Blogs & Podcasts

Insights

\ Identity & Access Management 



September 20, 2017 | Account Provisioning
By Aaron Turner, IANS Faculty

 Revoke Network Access Efficiently and Effectively

Depending on the human element and manual notifications to revoke network access when users leave the company is neither scalable nor dependable. In this Ask-an-Expert written response, IANS Faculty Aaron Turner suggests using some script-based workarounds to automate the process while evaluating the move to a newer, more automated IDAM platform for the future.

Read More »


September 14, 2017 | Encryption, Digital Signatures, Certificates, Tokenization
By Dave Shackleford, IANS Faculty

 Apply Blockchain Technology to Enterprise Security

Blockchain has been the focus of many hype cycles of late, and it seems to be making inroads into every technology area under the sun - but how enterprise-ready is it? In this report, IANS Lead Faculty Dave Shackleford examines how the technology works and details its current and future use cases in security.

Read More »


August 15, 2017 | Application Development and Testing
By Andrew Carroll, IANS Faculty

 Help Developers Understand the Importance of Least Privilege

Developers usually push to access any data they want anytime they want it, but unfettered access can open the whole organization up to unnecessary audit, financial and reputational risks. In this Ask-an-Expert written response, IANS Faculty Andrew Carroll suggests educating developers on the risks, implementing least privilege and layering on controls to ensure compliance.

Read More »


July 26, 2017 | Password Management
By Rich Guida, IANS Faculty

 Implement a Strong Corporate Password Policy

Creating a corporate password policy can be a very complex challenge, particularly considering the fact that passwords bring with them some significant enterprise risks. In this Ask-an-Expert written response, IANS Faculty Rich Guida details the standard guidelines for password policies and offers tips for taking them to the next level. 

Read More »


June 30, 2017 | Privileged Access Management
By Aaron Turner, IANS Faculty

 Build a Scalable Privileged Identity Management Program

The scope of the privileged identity problem continues to expand for organizations and is only exacerbated by the lack of investment in IDAM technologies. In this report, IANS Faculty Aaron Turner offers recommendations for aligning an overarching identity program with privileged user management from both a process and technology perspective. 

Read More »


June 2, 2017 | Authentication
By Aaron Turner, IANS Faculty

 Authentication: Past, Present and Future

Authentication methods and protocols have changed a lot over the years, but which are best suited to today's complex enterprise environments? In this Ask-an-Expert written response, IANS Faculty Aaron Turner provides an overview of the most used (and effective) authentication protocols.

Read More »


May 24, 2017 | Security Policies and Strategy
By George Gerchow, IANS Faculty

 Get Your Security Spending Priorities in Order

Budgeting for new security initiatives requires prioritizing technologies that help improve security today -- and tomorrow. In this Ask-an-Expert written response, IANS Faculty George Gerchow offers his take on the importance of cloud access security brokers, privileged access management and other tools for companies moving to the cloud.

Read More »