5 things businesses should know about Identity Access Management

Cybersecurity insurance CSC Blogs

Applying appropriate and sufficient controls to manage user accounts and access rights is one of the most significant challenges in today’s enterprise’s IT environment. Intentional or accidental misuse of IT-driven business processes by authorized users can have a severe impact on the enterprise and its competitive position. Vendors of Identity Access Management (IAM) solutions tend to promise […]

5 Things every Board Member Should Know about Identity and Access Management (IAM)

Cloud data storage, multiple business applications, BYOD, home office – Applying appropriate and sufficient controls for managing user accounts and access rights address one of the most significant challenges in today’s enterprise’s IT environment. Intentional or accidental misuse of IT driven business processes by (formerly) authorized users may have a severe impact on the enterprise […]

The Human Perimeter

The Human Perimeter

In an “Outside-In” world, some companies are struggling to implement unified identity and access management (I&AM). Some are asking where their security perimeter now lies. High-profile data breaches such as those at Ashley Madison, Sony, JPMorgan Chase, eBay, Adobe and Target no doubt have CIOs wondering whether they will be hit next. Is unified identity […]