10 Identity Management & Healthcare IT Articles for the New Year

Share on linkedin
Share on twitter
Share on facebook

healthcare it articles

Thanks for reading the Idenhaus Identity Management biweekly news digest. Every 2 weeks, we curate a selection of IGA, Healthcare IT, Cybersecurity, Data Governance, Infosecurity, and IAM articles. Check out our resources section for webinars, case studies, infographics, and educational videos.

To receive the top Cybersecurity and IAM articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.

 


identity automation governance


10 Identity Management & Healthcare IT Articles for the New Year

 

Top Identity Management Videos from 2019 via Idenhaus

What were Identity & Access Management and Cybersecurity experts watching in 2019? Let’s take a look back at our most viewed Identity Management videos from 2019

Digital identity predictions for 2020: biometrics, deepfakes, cybersecurity and decentralized ID via BiometricUpdate

Companies in the biometrics, digital identity, and cybersecurity space have shared predictions for 2020, touching on many of the key themes of the past year, and reflecting the wealth of opportunity, as well as the anxieties at play in the industry.

Identity and Access Management – Bridging the Efficiency and Security Gap in Healthcare via HIT Consultant

In order to protect access to sensitive data and assets, IAM must become the cornerstone of IT infrastructure and security strategy in healthcare organizations.

10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence via Forbes

By securing every endpoint with a persistent connection and the resiliency to autonomously self-heal, CIOs are finding new ways to further improve network security by capitalizing on each IT assets’ intelligence.

Healthcare Security: How To Deploy IoT Securely via SecurityBoulevard

While governments can do more to help ensure healthcare IoT and medical devices are made securely, providers have an ultimate say: if they see devices aren’t inherently secure and manageable, they can choose devices that are.

Which Comes First: Identity Automation or Governance? via Idenhaus

When getting started with IAM, companies will need to decide whether to begin with automation or governance first. This webinar will explore both approaches and make a case for which should come first.

Cyber Threats Behind the Biggest Healthcare Data Breaches of 2019 via HealthITSecurity

Ransomware saw a resurgence in 2019, which disrupted patient care across the US. But third-party vendor breaches and phishing caused some of the largest healthcare data breaches of 2019.

The Role of IoT Identity Management in 2020 via

Digital identity management is one of the crucial areas where IoT falls short. A primary reason is that security concerns may leak to disastrous consequences like financial loss, confidentiality leaks, and data tampering.

Healthcare Bug Bounty Programs Have Big Payouts, Opportunity via Dice

Healthcare bug bounty programs outpace the rest of the industry. HackerOne reports its average payout is about $625 per bug reported, several hundred less than what severe healthcare bugs tend to pay.

IAM Roadmaps are Key to Secure Funding for Your IAM Project  via Idenhaus

Can we re-position IT from a cost center (aka ‘value-destroying’) to a profit center (‘value-creating’) to realize its full potential as a strategic enabler to the organization?

 

Check out our previous digest of cybersecurity and Healthcare IT articles, 9 Must-Read Cybersecurity and Healthcare IT Articles

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


Follow @Idenhaus on Twitter and subscribe to our YouTube channel

To receive the top Cybersecurity and IAM articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top