Tuebora Blog

Communicate Your IAM Intent Directly to You Applications

Using IAM to Eliminate Barriers to Business Productivity

 

Within a complex modern corporate network, properly managing user identities is both a productivity challenge and an opportunity. The challenge is to meet that core security aim of securely managing user access while balancing that with providing the right people with the right access at the times they need it. This article describes the central role a robust identity and access management strategy and solution plays in balancing security with productivity. 

Read More

Digital Identity Management in the Public Sector

The global pandemic provided an important opportunity for public sector departments to transform how they let citizens access crucial services. Demand surged for citizens wanting to access benefit claims, information on Covid vaccinations, and other important public services. This article describes the central role digital identities and their secure management plays in shaping the public sector’s future. 

Read More

Identity Attack Vectors (Methods and Tactics)

Identity attack vectors extend the surface area for cyber attacks beyond the open ports, database vulnerabilities, and insecure protocols that malicious intruders often seek to exploit. The purpose of identity attacks is to compromise identities on a network and impersonate that identity for a nefarious purpose. This article describes identity attack vectors by focusing on the methods and tactics used to take over compromised identities on a corporate network. 

Read More

Analyzing the Colonial Pipeline Cyber Attack from An Identity Management Perspective

 

Read More

Identity as the New Network Perimeter

Whether you’re talking about devices or users, identity is the common factor that enables or weakens an organization’s information security posture. Proper identity and access management:

  1. provides users and devices with the right level of access matching their role and responsibility,
  2. supports and provides statistical analysis of processes that include authorization and certification to determine compliance
  3. highlight IAM process inefficiencies and,  
  4. help you discover and remove accounts that are no longer in use or are no longer needed for a job function.

This article describes how identity functions as the new network perimeter within the modern corporate network infrastructure. 

Read More

Entitlement Creep (What is it and How to Reduce it with Automated Identity Governance?)

 

Read More

How IAM Supports A Zero Trust Security Model

 

Read More

IAM Data Security Context

Read More