Blog – IAM

Explore expert insights, industry trends, and practical solutions in identity and access management.

Get in Touch
The Role of IAM in Canada's Digital Ambition

The Role of IAM in Canada's Digital Ambition

In 2022, the Government of Canada announced an ambitious plan to redefine its digital future, which is reviewed yearly. This "Digital Ambition" aims to provide a seamless, secure, and profoundly citizen-centric online experience, promising greater...

June 10, 2025 | KeyData

IAM
It’s Not What You Know, It’s Who You Know - Identity Vetting in the Age of AI

It’s Not What You Know, It’s Who You Know - Identity Vetting in the Age of AI

A non-centralized threat group uses stolen identities to get North Koreans hired at tech firms so they can gain access to systems and generate income for the regime. Companies who have fallen prey to this scam have faced costly repercussions. So, if...

May 13, 2025 | KeyData

IAM
Securing Digital Identities at Scale with Custom Identity Workflows

Securing Digital Identities at Scale with Custom Identity Workflows

Think about the different types of identities you manage, including employees, non-employees, customers, vendors, partners, APIs, service account, and IoT devices, just to name a few. The complexity of managing digital identities at scale is arguably...

May 12, 2025 | KeyData

IAM
Strategic Synergy: CSPM and IAM for a Resilient Cloud

Strategic Synergy: CSPM and IAM for a Resilient Cloud

Cloud Security Posture Management (CSPM) plays a vital role in ensuring your cloud resources are configured securely, but it’s just one part of a robust security architecture and IAM is crucial for controlling who has access to those resources. In this...

April 28, 2025 | KeyData

IAM
Migrate from MIM to Saviynt Without Losing Your Mind ...or Your Data

Migrate from MIM to Saviynt Without Losing Your Mind ...or Your Data

It’s been 4 years since Microsoft announced that support would end for Microsoft Identity Manager in January of 2029. Some organizations, particularly those with fairly simple MIM configurations that could be easily ported, were able to quickly...

April 22, 2025 | KeyData

IAM
Identity Security Across Centralized and Decentralized Models

Identity Security Across Centralized and Decentralized Models

Whether your identity and access management model is centralized, decentralized, or somewhere in between, it should evolve with your organization—not hold it back. In this blog, we break down why decentralized IAM happens, when it makes sense, and how...

April 8, 2025 | KeyData

IAM
I Connect Therefore I Am: Extending Zero Trust to Machine Identities

I Connect Therefore I Am: Extending Zero Trust to Machine Identities

The sheer volume of machine identities has expanded the attack surface exponentially for most organizations. Without a clear understanding of what these machines are doing and how they're accessing resources, organizations operate with a significant...

April 1, 2025 | KeyData

IAM
Lessons Learned From The SickKids Hospital Breach: What Went Wrong and How to Prevent It

Lessons Learned From The SickKids Hospital Breach: What Went Wrong and How to Prevent It

The Hospital for Sick Children in Toronto, Canada was the target of a ransomware incident carried out by the notorious LockBit cybercriminal organization. This dangerous attack disrupted vital hospital functions, leading to delays in obtaining...

March 11, 2025 | KeyData

IAM
Building an Enterprise-Wide Security Culture with an Identify-First Mindset

Building an Enterprise-Wide Security Culture with an Identify-First Mindset

In the past, IT security meant locking the door to the server room and manually managing user access, but a lot has changed since then. With a distributed workforce collaborating from anywhere in the world through cloud and hybrid applications, locking...

February 19, 2025 | KeyData

IAM
CISO Blueprint for Higher Education

CISO Blueprint for Higher Education

In higher education cybersecurity, there's a lot you can't control. The threat landscape is constantly shifting, budgets are tight, and users can be unpredictable. This blueprint offers four steps to help you focus on what you can control to build a...

February 5, 2025 | KeyData

IAM
Fortify and Defend: Fight Ransomware with an Identity-Centric Security Program

Fortify and Defend: Fight Ransomware with an Identity-Centric Security Program

Is your organization prepared for the rising threat of ransomware? Fight ransomware with an Identity-Centric Security Program to strengthen your defenses and protect your critical data.

January 31, 2025 | KeyData

IAM
Higher Education IAM Challenges - Solved

Higher Education IAM Challenges - Solved

Higher education faces unique identity security challenges. Learn how to manage multiple personas, secure cloud & on-prem systems, and strengthen your security.

January 14, 2025 | KeyData

IAM
Is Your University's IAM Ready?

Is Your University's IAM Ready?

Universities face growing challenges: managing seamless access for a large volume of students, faculty, and staff across digital platforms. Outdated IAM systems leave institutions vulnerable.

October 10, 2024 | KeyData

IAM
What Can we Learn About Solving IAM Problems From the Classic Board Game Risk?

Your Move: What Can we Learn About Solving IAM Problems From the Classic Board Game Risk?

IAM success, like winning in RISK, requires strategy, adaptability, and risk assessment. Learn how diplomacy, patience & commitment in RISK mirror IAM principles for tackling uncertainty and change.

September 17, 2024 | Dustin Hoff

IAM
Start Maximizing Business Value with an IAM Maturity Assessment

Start Maximizing Business Value with an IAM Maturity Assessment

An IAM maturity assessment reveals hidden costs of outdated practices and highlights business value through improved efficiency and security. Learn how maturing IAM drives growth and justifies investments.

August 1, 2024 | KeyData

IAM

Don't know
where to start?

Looking to assess your current state, map out strengths, identify gaps and design a tailored roadmap to an optimal target state IAM program?

Book your complimentary assessment workshop and get started today.

Get Started
KeyData Cyber Logo

Copyright © 2024 KeyData Cyber.
All Rights Reserved.

keydatacyber twitterkeydatacyber facebookkeydata-associates linkedinkeydatacyber instagramKeyData Cyber youtube