Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity articles. Every 2 weeks, we curate a selection of IGA, Healthcare, Cybersecurity, Data Governance, Infosecurity, and IAM news. Check out our resources section for webinars, case studies, infographics, and educational videos.
To receive the top Identity Management and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.
10 Identity Management and Cybersecurity Articles, April 2020
Tips for Working Remotely and Securely via Idenhaus
How secure are your employees’ home networks? Do they have encryption on their Wi-Fi? Are they running anti-virus software, and have they installed the latest software patches?
Want to Improve Cloud Security? It Starts with Logging via DarkReading
Remedying the “garbage in, garbage out” problem is possible, but it requires an understanding of what is causing the problem in the first place.
Tech Optimization: Medical Device and IoT Operating Secrets via HealthcareITNews
Three medical device experts – from Capsule Technologies, First Databank and Pivot Point Consulting – give CIOs, CMIOs, CMOs, CISOs and others some best practices for Internet of Things security and safety.
Prediction: The Coronavirus Alters Discourse on Identity Governance and Administration via SolutionsReview
The coronavirus outbreak increases identity governance’s prominence because the latter provides much-needed visibility and control over users’ permissions. Moreover, if someone has permissions beyond their station, your IT team needs to have the capabilities to remove them. IGA can provide such capability through its basic functioning.
Coronavirus Chaos Ripe for Hackers to Exploit Medical Device Vulnerabilities via MedTechDive
“The attack surface” in healthcare, thanks to increasing uses of telehealth and remote patient monitoring during the coronavirus outbreak, “has accelerated to a level we wouldn’t have expected to see over a 10-year timeframe.”
Unlocking Benefits of Identity Management Roadmap [Webinar] via Idenhaus
Learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide key stakeholders at your company from concept to reality.
Healthcare Data Infrastructure Security Cannot Be Ignored During a Pandemic via HITConsultant
Healthcare institutions are struggling to not only meet basic privacy and compliance laws but have difficulty leveraging the large amounts of data that they store in a meaningful way.
IoT Security Failures are No Child’s Play via ITProPortal
How can software-driven organizations better protect devices? And, what can be done during the software development life cycle (SDLC) to ensure vulnerabilities are identified and fixed in development, or prioritized for remediation in production based on actual usage?
Cyberattacks Continue to Mount During COVID-19 Pandemic via HealthcareITNews
From PPE phishing scams to ransomware to hospital supply chain risks, hackers and scammers are seizing on the chaos of the coronavirus crisis.
Five Identity Governance Best Practices via Idenhaus
Here are several identity governance best practices to help your organization have a successful IGA project.
Check out our previous digest IAM and cybersecurity articles, 8 Healthcare IT and Identity Management Articles, March 2020
To receive the top Cybersecurity and IAM articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
Follow @Idenhaus on Twitter and subscribe to our YouTube channel.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us