Fr. 35.50

IAM and PAM Cybersecurity - Securing Identities and Access Management in the Digitalization Era

Englisch · Taschenbuch

Versand in der Regel in 6 bis 7 Wochen

Beschreibung

Mehr lesen

In today s digital age, organizations face growing cyber threats targeting user identities and access credentials. Identity and Access Management (IAM) helps secure identities, manage privileges, and enforce security policies making it essential for zero-trust security, compliance, and efficiency.
Privileged Access Management (PAM), a specialized branch of IAM, focuses on protecting and monitoring privileged accounts such as administrators, root users, and service accounts. Because these accounts have elevated access, they are prime targets for cyberattacks.
Together, IAM and PAM safeguard access to systems, applications, and data, playing a vital role in cloud security, IoT, and enterprise environments by preventing unauthorized access and mitigating insider threats.
Readers will learn:
·        Why securing identities is critical today
·       

Inhaltsverzeichnis

Chapter 1: IAM, Securing Identities in the Digitalization Era.- Chapter 2: PAM, Protecting Privileged Accounts and Access Management.- Chapter 3: IAM and PAM risks, impacts, and challenges.- Chapter 4: IAM and PAM tools and frameworks.

Über den Autor / die Autorin










Massimo Nardone has more than 27 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 27 years. He holds an M.Sc. degree in computing science from the University of Salerno, Italy. Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc.

In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.

His technical skills include Security, OT/IoT/IIoT, Android, Cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University).

He stays current to industry and security trends, attending events, being part of a board such as the ISACA Finland Chapter Board, ISF, Nordic CISO Forum, Android Global Forum, etc.

He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as a Cyber Security Freelancer for IT/OT and IoT. He has reviewed more than 55 IT books for different publishers and has coauthored Pro Spring Security (Apress, 2023) Pro JPA 2 in Java EE 8 (Apress, 2018), Beginning EJB in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).

Zusammenfassung


In today’s digital age, organizations face growing cyber threats targeting user identities and access credentials.
Identity and Access Management (IAM)
helps secure identities, manage privileges, and enforce security policies—making it essential for zero-trust security, compliance, and efficiency.

Privileged Access Management (PAM)
, a specialized branch of IAM, focuses on protecting and monitoring privileged accounts such as administrators, root users, and service accounts. Because these accounts have elevated access, they are prime targets for cyberattacks.

Together, IAM and PAM safeguard access to systems, applications, and data, playing a vital role in cloud security, IoT, and enterprise environments by preventing unauthorized access and mitigating insider threats.
Readers will learn:
·        Why securing identities is critical today
·        Key differences between IAM and PAM
·        Major access management risks and challenges
·        Common IAM and PAM solutions (e.g., Azure AD, Okta, CyberArk, BeyondTrust, SSH Communications Security)

Produktdetails

Autoren Massimo Nardone
Verlag Springer, Berlin
 
Sprache Englisch
Produktform Taschenbuch
Erschienen 02.03.2026
 
EAN 9798868820182
ISBN 9798868820182
Seiten 137
Abmessung 155 mm x 8 mm x 235 mm
Gewicht 236 g
Illustration IX, 137 p. 16 illus.
Serie Apress Pocket Guides
Themen Naturwissenschaften, Medizin, Informatik, Technik > Informatik, EDV > Informatik

Netzwerksicherheit, Security, Privacy, Identity, Cybersecurity, Data and Information Security, Mobile and Network Security, Security Services, Identity and access management, IAM, Pam, priviliged access management

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.