Identity and Access Management (IAM) is one of the most important areas in enterprise IT security today, and it’s only becoming more prominent as large-scale breaches of corporate networks and political organizations continue to shake consumer trust and incite ever-increasing government regulation.
Staying on top of the latest news, trends, and best practices is a big part of the job for any InfoSec pro, and blogs are a great resource… but with content marketing as hot as it is, the web is awash with self-promotional content—it can be difficult to find useful information.
Lucky for you, we’ve combed through the IAM blogosphere and pulled a few of the best IAM blogs, from vendors and thought leaders alike, presented here in no particular order. These blogs generally follow three rules:
- Frequent Updates
- Useful Content
- Limited Self-Promotion
Of course, this list is totally subjective, so if you think we’ve missed anything, feel free to let us know in the comments.
Why we read it: General authentication, access management, and governance best practices with particularly strong insight on verticals such as higher education and healthcare.
Example Post: Is 2FA Enough, or Do I Need MFA?
Why we read it: UXP’s blog has a unique focus on all things digital identity—from privacy to strategy, to the identity economy.
Example Post: 9 Resolutions for Data Privacy in 2017
Why we read it: Since acquiring UnboundID last year, Ping Identity’s blog has taken a strong focus on trends and best practices for customer identity and access management (CIAM) use cases.
Example Post: 3 Things CMOs Need to Know about CIAM
Matt Flynn’s IAM Blog
Why we read it: Matt Flynn is a leading IAM analyst who offers opinions on a variety of security subjects with a refreshing, vendor-neutral point of view.
Example Post: A Few Thoughts on Privacy in the Age of Social Media
Why we read it: As a leading provider of IGA solutions, Sailpoint’s blog is a go-to for identity governance advice and best practices.
Example Post: What’s the Goal for IT Leaders: Security or Complaince?
Latest posts by Jeff Edwards (see all)
- 17 Cybersecurity Podcasts You Should Listen to in 2019 - January 3, 2019
- What’s Changed: Gartner 2017 Magic Quadrant for Identity Governance and Administration (IGA) - January 28, 2018
- Crossmatch Integrates Keyboard Capture to Identity Management Software - November 27, 2017