11 Must-Read Identity Management and Cybersecurity Articles

Share on linkedin
Share on twitter
Share on facebook

identity management and cybersecurity articles

Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity articles. Every 2 weeks, we curate a selection of IGA, Healthcare IT, Cybersecurity, Data Governance, Infosecurity, and IAM news. Check out our resources section for webinars, case studies, infographics, and educational videos.

To receive the top Identity Management and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.

 


How-To-Secure-Funding-for-your-Identity-Management-Program


11 Identity Management and Cybersecurity Articles, February 2020

 

Highlights from SailPoint Sales Kickoff 2020 #SKO2020 via Idenhaus

SailPoint shared their vision for Unstoppable Innovation with how Predictive Identity is shaping the future of security. In an era where “hackers don’t break-in, they log in,” Identity is the new firewall.

 

EU Representative on ‘How to operationalize Article 27’ of the GDPR via IAPP

The EU General Data Protection Regulation requires organizations based outside of the European Union but subject to the GDPR to appoint an EU representative. What does this mean in practice?

 

Is Blockchain a Cure for Healthcare Data Breaches? via TechHQ

Blockchain experimentation is rife across almost every industry and use case imaginable, and with the data security situation in the healthcare sector bleak, the industry is exploring how the distributed ledger technology (DLT) could add layers of protection and efficiency, as more sensitive data must be handled day-to-day.

 

5 Final Thoughts on Gartner IAM 2019 via Idenhaus

Now that we have had some time to reflect on the conference as a whole, I wanted to share a few more takeaways from Gartner IAM 2019.

 

Embracing a Prevention Mindset to Protect Critical Infrastructure via DarkReading

As we enter the next decade, executive leadership for critical infrastructure organizations must take a hard look at their existing IT systems, their security practices, and, most importantly, their attitudes toward how they approach cybersecurity.

 

Balancing The Act Of Agility And Security In Healthcare via DataEconomy

One of the most important transitions for healthcare systems is the leap to the cloud, as organizations seek to become more ‘agile’ in order to adapt quickly to changing demands. Traditionally, organizations have been tied to one data center; being unable to diversify means if one area goes down, the whole network goes down.

 

How To Secure Funding for your Identity Management Program via Idenhaus

One challenge almost all IT organizations face is how to get funding to build and mature their Identity Management (IAM) solution. While the technical ins and outs are well understood by IT departments, there is often a gap communicating the promise of IAM to business stakeholders in terms that are compelling.

 

Protecting Patient Data through Stringent Access Rights Management via OpenAccessGovernment

Here are four simple steps healthcare administrators can follow to keep track of their organisations through a controlled assignment of access rights.

 

New Account Risk Assessment: Digital Identities Are the Key via ThePaypers

Financial Institutions (FI) are looking for solutions to help more seamlessly and effectively conduct identity verification at onboarding. 88% of FI fraud executives surveyed indicate that improving the customer onboarding experience is a key business case driver.

 

Cybersecurity Pros Offer Their 2020 Predictions for Healthcare via HealthcareITNews

Ransomware “will continue to be the biggest issue,” says one expert – but a troubling new trend of attacking automatic software and firmware update systems is another area for concern.

 

 

Using Systems Thinking to Handle Errors In Your IAM Solution  via Idenhaus

The real value of Systems Thinking emerges when used as a holistic perspective on your HR processes and IAM systems. It allows us to pinpoint the root cause of the actual problem, while also understanding the extended context that surrounds it.

 

Check out our previous digest IAM and cybersecurity articles, 10 IAM and Cybersecurity Articles, February 2020

 

To receive the top Cybersecurity and IAM articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top