Thanks for checking out the biweekly Idenhaus IAM and Cybersecurity articles. Every 2 weeks, we curate a selection of IGA, Healthcare IT, Cybersecurity, Data Governance, Infosecurity, and IAM news. Check out our resources section for webinars, case studies, infographics, and educational videos.
10 IAM & Cybersecurity Articles, February 2020
5 Final Thoughts on Gartner IAM 2019 via Idenhaus
The biggest takeaway from Gartner IAM 2019 is that the Identity and Access Management Industry needs to change the conversation to be more focused on the value of the assets we are asked to protect.
The Benefits of Identity Management for Healthcare Businesses via SolutionsReview
Identity Management for healthcare businesses offers not only an opportunity to fortify IT infrastructures. It can also help ensure compliance, specifically with the Health Insurance Portability and Accountability Act (HIPAA), and with the user experience.
Through roughly a year of open collaboration with stakeholders from across government, academia, and industry, we have worked to craft and hone a tool to help organizations better identify, prioritize, and manage privacy risks to protect individuals’ privacy.
One challenge almost all IT organizations face is how to get funding to build and mature their Identity Management (IAM) solution. While the technical ins and outs are well understood by IT departments, there is often a gap communicating the promise of IAM to business stakeholders in terms that are compelling.
Pentesting can reveal weaknesses in infrastructure and applications, demonstrate the success of effective security controls, elucidate potential attack pathways and provide quality assurance.
Nearly half of federal government IT executives in a new survey said their agencies are moving away from traditional network perimeter defense tactics and taking steps to adopt identity-centered, or zero-trust, security strategies to protect their digital resources.
Evaluating Cyber Readiness, Vulnerabilities with Pen Testing via HealthITSecurity
Once a healthcare organization has built what it feels is a strong defense and security program, security leaders can look to third-party vendor penetration testing to evaluate its cyber readiness.
Ransomware Targeting Health Systems in More ‘Sophisticated’ Ways via Modern Healthcare
Sometimes, ransomware can feel like the flu. As soon as hospitals find a defense, a new and more sophisticated version appears—making it difficult for hospital leaders to keep up.
The FDA has issued a safety communication informing healthcare providers, facilities, and patients about cybersecurity vulnerabilities associated with certain GE Healthcare Clinical Information Central Stations and Telemetry Servers.
Successful RBAC implementation requires a variety of principles and tools to analyze access, identify patterns, and change the processes and systems to automate the assignment of core user privileges.
Check out our previous digest IAM and cybersecurity articles, 9 Identity Management & Cybersecurity Articles, January 2020
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us