Thanks for reading the Idenhaus Identity Management biweekly news digest. Every 2 weeks, we curate a selection of IGA, Healthcare Cybersecurity, Data Governance, Infosecurity, and IAM articles. Check out our resources section for webinars, case studies, infographics, and educational videos.
Are you attending Gartner IAM next week?
We are happy to schedule time over breakfast or in between sessions to answer your questions and share our IAM implementation experience. Fill out our contact form to book 30 minutes to meet with us.
Identity Management Biweekly: 10 Must-Read IAM and Healthcare Cybersecurity Articles
In this video, Hanno Ekdahl and Nicole Keaton Hart take a look at user access management across a worker’s lifecycle, specifically “in the middle” when workers may change departments, roles, or locations in the organization.
The Gartner 2019 Critical Capabilities for Identity Governance and Administration highlights 11 vendors researchers consider the most significant. Then, they evaluate these vendors against nine critical capabilities and four distinct use cases.
The State of Healthcare Cybersecurity and the Dark Web Economy via Security Magazine
There are few industries where the cybersecurity stakes are higher than in the healthcare space, with medical organizations running the risk of life-threatening disruptions at the hands of malicious actors
As Cloud Security Improves, a Weak Link Emerges: People via SiliconAngle
Some of the most notorious cloud breaches have been the result of sensitive data being left in the open on cloud servers. Human error is again to blame.
Wearable Technology in Healthcare: What are the Leading Themes? via Verdict Medical Devices
The challenges that wearable technology is facing are broad. They range from data security, trust issues, and incentivisation to regulatory and ethical hurdles.
How the Internet of Things will Change Finance via BusinessTimes
An EY report noted that probably the most important and fundamental change that the IoT introduces to the financial sector is the disruption of established information asymmetry.
Hospitals are reluctant to disclose attacks, and regulations don’t offer clear advice about what to tell patients.
How Can Patients Protect Their Medical Devices from Hackers? via MDDI Online
FDA and manufacturers shoulder most of the cybersecurity burden, but should patients and caregivers also play a role?
5 Potential Oversights In Enterprise Identity Management via Solutions Review
Identity forms the basis of enterprise cybersecurity. In fact, security experts proclaim identity as the new digital perimeter; through strong continuous authentication, your enterprise can enforce stronger cybersecurity than ever.
Can implementing Identity Management (IDM) degrade a company’s provisioning performance? In a word, yes!
Check out our previous digest of cybersecurity and IAM articles, Identity Management Biweekly: 8 Cybersecurity and Healthcare IT Articles
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us