11 Identity and Cloud Security Articles, October 2020

Share on linkedin
Share on twitter
Share on facebook

identity and cloud security articles

Thanks for checking out this week’s digest of identity and cloud security articles. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

business email compromise

11 Identity and Cloud Security Articles

 

3 Areas of Legal Exposure After a Security Breach via Idenhaus

Data security is now a top concern for both general counsel and corporate directors. In this tumultuous environment, it’s important to know what your legal exposure is so you can take steps to limit risks.

 

Ransomware: How It Has Evolved to Be Faster, Stealthier, and Strike Harder via F5

We’ve finally reached the boiling point with ransomware attacks. It’s gone from being a nuisance to a significant financial burden as well as a mortal threat to our critical infrastructure.

 

NSA publishes list of top vulnerabilities currently targeted by Chinese hackers via ZDNet

NSA urges US public and private sector to apply patches or mitigations to prevent attacks.

 

Mythbusters: Three Misconceptions About Zero Trust via Infosecurity Magazine

Over the years this definition of Zero Trust has shifted, with vendors overusing the phrase and muddying the waters. So, what’s the key to achieving perfect Zero Trust? The first step is putting to rest common misconceptions that have come to light over the years.

 

The anatomy of an endpoint attack via HelpNet Security

A lot has changed across the cybersecurity threat landscape in the last decade, but one thing has remained the same: the endpoint is under siege.

 

When Do We Trust AI’s Recommendations More Than People’s? via HBR

When do consumers trust the word of a machine, and when do they resist it? Our research suggests that the key factor is whether consumers are focused on the functional and practical aspects of a product (its utilitarian value) or focused on the experiential and sensory aspects of a product (its hedonic value).

 

Why Observability Is the Next Big Thing in Security via DZone

“Without pre-existing observability of your application security, any cloud transformation and especially moves into cloud native environments can be significantly more challenging.”

 

The 5 principles of zero-trust security via TechTarget

Zero trust is a journey, not a destination. Ensure your corporate network is safe from internal and external threats by implementing these five principles of zero-trust security.

 

What’s New In Gartner’s Hype Cycle For Cloud Security, 2020 via Forbes

Enterprises who have successfully integrated cloud security into their broader enterprise cloud strategy are ahead of their peers in three key areas.

 

IBM Security Study Finds Employees New to Working from Home Pose Security Risk via IBM

The study shows more than 80% of respondents either rarely worked from home or not at all prior to the pandemic, and, in turn, more than half are now doing so with no new security policies to help guide them.

 

Disaster-Proof Identity Management: Start with a Strong Foundation via Idenhaus

In the end, most IAM projects fall short because they fail to follow a disciplined process that drives out all the relevant details.

 

Check out our previous digest of identity and Cloud Security Articles, 9 IGA and Cybersecurity Articles, October 2020

 

 

To receive the top identity and cloud security articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top