Credential stuffing, CCPA arbitration, biometrics, access management, and healthcare cybersecurity articles headline this week’s digest.
Thanks for checking out the biweekly Idenhaus Identity Access Management and Cybersecurity roundup. Every 2 weeks, we curate a selection of IGA, Healthcare, Cybersecurity, Data Governance, Infosecurity, and IAM news. Check out our resources section for webinars, case studies, infographics, and educational videos.
To receive the top Identity Management and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.
Identity Management and Cybersecurity
Biometrics have been around for quite a long time, going all the way back to the 1960s. But it is not until recently that they have started to make its splash in the realm of Identity Management.
How Privileged Access Management Can Protect PII via SecurityBoulevard
As organizations continue to grapple with new and emerging regulations, a mature privileged access management program can play a key role in helping to not only protect sensitive PII and comply with these directives, but also to continue to build consumer trust.
The Evolving Threat of Credential Stuffing via DarkReading
As more companies get better at locking down their front-end applications and web pages to safeguard against credential stuffing, bad actors have increasingly spotted an opportunity in the back-end APIs and microservices that have tended to be poorly defended.
Arbitration of CCPA Claims via JDSupra
This post reviews recent precedent concerning prior attempts by California to bar arbitration or otherwise ignore federal preemption in the context of privacy statutes in an effort to predict how the courts will navigate the CCPA’s attempted restriction on arbitration.
Learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide key stakeholders at your company from concept to reality.
Hey there! Are you using WhatsApp? Your account may be hackable via WeLiveSecurity
Can someone take control of your WhatsApp account by just knowing your phone number? We ran a small test to find out.
Understanding Role Based Access Control (RBAC) via Idenhaus
This article serves as an introduction to understanding role-based access control and how it can benefit your organization.
Healthcare IAM & Cybersecurity
Google launches Cloud Healthcare API in general availability via VentureBeat
Google today announced the launch in general availability of Cloud Healthcare API, a service that facilitates the exchange of data between health care applications and solutions built on Google Cloud.
Third Parties Prove Persistent Healthcare Data Risk via BusinessInsights
The report was clear to point out that while there were fewer insider data breaches, they are often more dangerous because insiders have legitimate access to sensitive and regulated patient data.
The clock starts now for hospitals and health plans under the just-announced CMS interoperability rules. There’s less than a year to implement sweeping (and life-saving) new health data sharing policies.
Most healthcare organizations recognize the importance of implementing IAM tools; however, their IT departments often struggle to mature and optimize their implementations. Based on our experience, here are three common mistakes to avoid when implementing access management.
Check out our previous digest IAM and cybersecurity articles, 10 Identity Management and Cybersecurity Articles, April 2020
To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.
[feature_box style=”33″ title=”Unlocking the Benefits of an IAM Roadmap
Are you using the right IAM solution to maximize your program’s value to your organization? How do you know which vendor is right for you? And how do you ultimately gain organizational buy-in? Join Idenhaus to learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide key stakeholders at your company from concept to reality.
In this webinar, you’ll learn:
– How to engage and empower your key stakeholders
– How to evaluate and prioritize the needs of your organization
– How to find the best fit of available solutions
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us