IBRS State of Identity Whitepaper
This paper sheds light on critical aspects of identity and access management such as justifying investments, controlling federated identities, and addressing certification fatigue.
This paper sheds light on critical aspects of identity and access management such as justifying investments, controlling federated identities, and addressing certification fatigue.
Facing a cyber security breach can make or break your organisation’s brand and trust. Be proactive and set up your comprehensive response plan as a matter of priority.
As detailed in part one of this pair of notes, the Australian Signals Directorate’s Essential Eight (E8) are detailed technical recommendations for securing an information infrastructure. Implementing them has been touted as being effective against over 85 % of potential attacks. It is hard to ignore that benefit to an organisation’s security stance.