Risk, supply chain hacks, and Identity Management strategy headline this week’s digest of IdM and Cybersecurity Articles.
Thanks for checking out this week’s digest of IdM and Cybersecurity articles. Click here to view the healthcare-focused digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.
10 IdM and Cybersecurity Articles, January 2021
What is an Identity Management Strategy? via Idenhaus
IAM is one of those solutions that sounds easy but is actually really difficult to get right. Statistically, more than half of IAM projects fail the first time, and even those that “succeed” usually fall short of expectations.
Understanding third-party hacks in the aftermath of the SolarWinds breach via HelpNetSecurity
If you were using a version that was hacked, you should certainly report on what you did to investigate whether or not there was further compromise, how closely you were able follow CISA recommendations, what were the results of the investigation, what you did to contain the affected systems, and whether or not (in consultation with your legal department) you suffered a breach as a result – but you should definitely do not stop there.
Compliance should view cyber-security through prism of risk via ComplianceWeek
What’s most important for compliance officers is to understand the risks that breaches and hacks pose to their organizations, not the technical manner of how those breaches occur. Expertise in the technical aspects of cyber-security is not required to understand those risks.
4 ways security has failed to become a boardroom issue via CSO Online
Twenty-eight percent of respondents believe cybersecurity is entirely a technology area, while 41% say that cybersecurity is mostly a technology area with some emphasis on the business aspects of cybersecurity. Alarmingly, 11% still think of cybersecurity as a regulatory compliance area alone.
WhatsApp loses millions of users after terms update via The Guardian
Poorly-executed change to terms of service sends messaging app’s subscribers flocking to competitors
Today, IoT and connected devices are becoming prime targets for hackers everywhere. And while there’s no magic bullet to secure them all against every possible attack, it’s not that hard to create a purpose-built network for your IoT devices to keep them as safe as possible.
Industry Experts Offer Cybersecurity Advice for a COVID World via FinTech Times
The coronavirus crisis has exposed many areas in business that had been neglected prior to the pandemic. And IT is no exception.
In their attempt to extort as much money as quickly as possible out of companies, ransomware gangs know some effective techniques to get the full attention of a firm’s management team.
The perfect theft: the increase in card-not-present fraud via ATM Marketplace
With so much sensitive data readily available on the black market and given the difficulty merchants face when attempting to validate a consumer’s identity online, digital CNP transactions provide fraudsters with the perfect opportunity for theft.
The simplest and most effective way to link your business strategy with your IAM program is to build a solution roadmap, which lays out your plan for the next 1 to 2 years. The process to create a roadmap requires input from both technical and business stakeholders and makes the implicit explicit.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us