top of page
  • Writer's pictureDeborah

Identity Access Management or IAM although not new is becoming increasingly a critical component of an enterprise cybersecurity program. It refers to the principles and practices of granting appropriate access to systems, network, applications and data. Put simply by the US National Institute of Standards and Technology (NIST), IAM ensures that the “right people and things have the right access to the right resources at the right time”, providing a layer of security that protects against unauthorized access.

Key concepts of IAM:

  • Authentication of an entity to check identity

  • Authorization of an entity to access specifics applications or data

Entities include an individual, a corporation, software or Internet of Things (IoT) devices.

IAM is one the tools used by organizations to mitigate cybersecurity risks and limit the risks of cyberattacks.

Recent Posts

See All

The Secured Overnight Financing Rate (SOFR) is a broad measure of the cost of borrowing cash overnight collateralized by Treasury securities. SOFR is the overnight interest rate for US dollar-denomina

13/06/2023 - Canadian Securities Administrators (CSA) SEDAR+ go-live date. All issuer filings, cease trade orders and disciplined list entries will be filed in SEDAR+ 16/06/2023 - OSFI consultation pe

On May 11, the Bank for International Settlements (BIS) published a Handbook on how central bank digital currencies (CBDCs) could work for offline payments, defined as a “transfer of value between dev

bottom of page