10 Must-Read IAM and Healthcare Cybersecurity Articles

Share on linkedin
Share on twitter
Share on facebook

Identity-Management-biweekly

Thanks for reading the Idenhaus Identity Management biweekly news digest. Every 2 weeks, we curate a selection of IGA, Healthcare Cybersecurity, Data Governance, Infosecurity, and IAM articles. Check out our resources section for webinars, case studies, infographics, and educational videos.

To receive the top Cybersecurity and IAM articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.


Are you attending Gartner IAM next week?
We are happy to schedule time over breakfast or in between sessions to answer your questions and share our IAM implementation experience. Fill out our contact form to book 30 minutes to meet with us.


Identity Management Biweekly: 10 Must-Read IAM and Healthcare Cybersecurity Articles

 

Identity Management: Managing User Access Across the Worker Lifecycle via Idenhaus

In this video, Hanno Ekdahl and Nicole Keaton Hart take a look at user access management across a worker’s lifecycle, specifically “in the middle” when workers may change departments, roles, or locations in the organization.

Key Findings: The Gartner 2019 Critical Capabilities for Identity Governance and Administration via SolutionsReview

The Gartner 2019 Critical Capabilities for Identity Governance and Administration highlights 11 vendors researchers consider the most significant. Then, they evaluate these vendors against nine critical capabilities and four distinct use cases.

The State of Healthcare Cybersecurity and the Dark Web Economy via Security Magazine

There are few industries where the cybersecurity stakes are higher than in the healthcare space, with medical organizations running the risk of life-threatening disruptions at the hands of malicious actors

As Cloud Security Improves, a Weak Link Emerges: People via SiliconAngle

Some of the most notorious cloud breaches have been the result of sensitive data being left in the open on cloud servers. Human error is again to blame.

Wearable Technology in Healthcare: What are the Leading Themes? via Verdict Medical Devices

The challenges that wearable technology is facing are broad. They range from data security, trust issues, and incentivisation to regulatory and ethical hurdles.

How the Internet of Things will Change Finance via BusinessTimes

An EY report noted that probably the most important and fundamental change that the IoT introduces to the financial sector is the disruption of established information asymmetry.

What Happens When Healthcare Data is Stolen or Held for Ransom? It Depends via TechRepublic

Hospitals are reluctant to disclose attacks, and regulations don’t offer clear advice about what to tell patients.

How Can Patients Protect Their Medical Devices from Hackers? via MDDI Online

FDA and manufacturers shoulder most of the cybersecurity burden, but should patients and caregivers also play a role?

5 Potential Oversights In Enterprise Identity Management via Solutions Review

Identity forms the basis of enterprise cybersecurity. In fact, security experts proclaim identity as the new digital perimeter; through strong continuous authentication, your enterprise can enforce stronger cybersecurity than ever.

Implementing Identity Management – Two Steps Forward, One Step Back  via Idenhaus

Can implementing Identity Management (IDM) degrade a company’s provisioning performance? In a word, yes!

 

Check out our previous digest of cybersecurity and IAM articles, Identity Management Biweekly: 8 Cybersecurity and Healthcare IT Articles

 

Follow @Idenhaus on Twitter and subscribe to our Identity Management biweekly or our healthcare IT biweekly newsletter.


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top