Identity-in-depth, data protection, and RDP attacks headline this week’s digest of Data Privacy and Cybersecurity Articles.
Thanks for checking out this week’s digest of Data Privacy and Cybersecurity articles. Click here to view the healthcare-focused digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.
10 Data Privacy and Cybersecurity Articles, March 2021
In this article, we discuss the components of Identity-in-Depth, what happens when an identity is compromised, and the defensive strategy to apply in such situations.
Microsoft investigating security groups for leaks to hackers via FinancialTimes (Subscription Required)
Microsoft is investigating whether security companies that it works with leaked details that aided cyber attackers.
Ransomware attacks in manufacturing tripled in 2020 via Silicon Republic
Ransomware attacks on OT systems have the potential to inflict far more damage than a regular IT system because they can impact critical products and services on a large scale. This creates a greater incentive for cybercriminals, making OT systems a more attractive target.
The new administration is in an excellent position to make significant progress on data privacy — not just because it’s needed, but also because it’s time.
Va. becomes second state with consumer data protection law via Virginia Business
The act, which was passed by the General Assembly last month, would let consumers receive copies of their online data, amend or delete that data, and opt out of allowing big businesses to use the data for marketing or other purposes. It would take effect on Jan. 1, 2023.
OWASP Top Ten Security Vulnerabilities To Look After via Hackernoon
The top 10 security risks were driven from the collected data, vulnerability, and prioritized according to this prevalence data from hundreds of organizations and 100k+ applications and API.
We ask security experts what businesses must do to defend against ransomware attacks and how to recover if all else fails.
A new report from the research firm suggests digital vaccination passports in the workplace can present significant risk.
RDP Attacks Persist Near Record Levels in 2021 via Dark Reading
Hastily implemented and configured RDPs in many organizations have played a role in driving this type of attack, says Namestnikova. The attack vector, already popular, has become even more accessible in terms of the number of users and level of security.
To prevent technology overload, security leaders must take a defense-in-depth approach and develop a clear, strategic plan based on business needs that addresses each layer of the security onion. By beginning with the business needs—not the technology needs—CISOs can focus their efforts on creating a well-defined, comprehensive strategy before speaking to vendors.
To receive the top Identity Management and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us