11 Must-Read Access Management Articles, April 2020

Credential stuffing, CCPA arbitration, biometrics, access management, and healthcare cybersecurity articles headline this week’s digest.

access management

Thanks for checking out the biweekly Idenhaus Identity Access Management and Cybersecurity roundup. Every 2 weeks, we curate a selection of IGA, Healthcare, Cybersecurity, Data Governance, Infosecurity, and IAM news. Check out our resources section for webinars, case studies, infographics, and educational videos.

To receive the top Identity Management and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.

identity management roadmap

 

Identity Management and Cybersecurity

An Introduction To Biometrics For Identity Management via Idenhaus

Biometrics have been around for quite a long time, going all the way back to the 1960s. But it is not until recently that they have started to make its splash in the realm of Identity Management.

 

How Privileged Access Management Can Protect PII via SecurityBoulevard

As organizations continue to grapple with new and emerging regulations, a mature privileged access management program can play a key role in helping to not only protect sensitive PII and comply with these directives, but also to continue to build consumer trust.

 

The Evolving Threat of Credential Stuffing via DarkReading

As more companies get better at locking down their front-end applications and web pages to safeguard against credential stuffing, bad actors have increasingly spotted an opportunity in the back-end APIs and microservices that have tended to be poorly defended.

 

Arbitration of CCPA Claims via JDSupra

This post reviews recent precedent concerning prior attempts by California to bar arbitration or otherwise ignore federal preemption in the context of privacy statutes in an effort to predict how the courts will navigate the CCPA’s attempted restriction on arbitration.

 

Unlocking Benefits of Identity Management Roadmap [Webinar] via Idenhaus

Learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide key stakeholders at your company from concept to reality.

 

Hey there! Are you using WhatsApp? Your account may be hackable via WeLiveSecurity

Can someone take control of your WhatsApp account by just knowing your phone number? We ran a small test to find out.

 

Understanding Role Based Access Control (RBAC) via Idenhaus

This article serves as an introduction to understanding role-based access control and how it can benefit your organization.

 

Healthcare IAM & Cybersecurity

Google launches Cloud Healthcare API in general availability via VentureBeat

Google today announced the launch in general availability of Cloud Healthcare API, a service that facilitates the exchange of data between health care applications and solutions built on Google Cloud.

 

Third Parties Prove Persistent Healthcare Data Risk via BusinessInsights

The report was clear to point out that while there were fewer insider data breaches, they are often more dangerous because insiders have legitimate access to sensitive and regulated patient data.

 

Hospitals and Health Plans Need to Move Fast Under Brand New CMS Data Sharing Rules via LinkedIn

The clock starts now for hospitals and health plans under the just-announced CMS interoperability rules. There’s less than a year to implement sweeping (and life-saving) new health data sharing policies.

 

Updating a Healthcare IAM Program? Avoid These 3 Common Mistakes via Idenhaus

Most healthcare organizations recognize the importance of implementing IAM tools; however, their IT departments often struggle to mature and optimize their implementations. Based on our experience, here are three common mistakes to avoid when implementing access management.

 

Check out our previous digest IAM and cybersecurity articles, 10 Identity Management and Cybersecurity Articles, April 2020

 

To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.

 

 

[feature_box style=”33″ title=”Unlocking the Benefits of an IAM Roadmap
” alignment=”center”]

identity management roadmap

Are you using the right IAM solution to maximize your program’s value to your organization? How do you know which vendor is right for you? And how do you ultimately gain organizational buy-in? Join Idenhaus to learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide key stakeholders at your company from concept to reality.

In this webinar, you’ll learn:
– How to engage and empower your key stakeholders
– How to evaluate and prioritize the needs of your organization
– How to find the best fit of available solutions

Reserve your spot now

[/feature_box]

 

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top