Stay informed with the Idenhaus Consulting Identity Management & Cybersecurity digest. We curate the best IAM/IDM, IoT, Identity Governance, & Information Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are 12 must-read articles from mid-March and early April 2018. Enjoy!
The code repository site says its security alerts are moving developers to patch known vulnerabilities.
This educational session on Friday, April 20 will provide a high-level overview of core Identity Management functionality. It introduces concepts such as provisioning, self-service, business workflow integration, and resource connection.
Report: The CEO and CTO Don’t See Eye to Eye on Cybersecurity via Associations Now
The report breaks down the issues on the communication front between technical execs and the person at the top of the C-suite.
One-Third of Internal User Accounts Are ‘Ghost Users’ via DarkReading
Attackers and malware can easily move laterally through an organization, thanks to inadequate access controls on file systems and a proliferation of inactive but enabled users.
EU Privacy Law Ready To Collide With Blockchain Tech via CryptoDaily
Blockchain technology is in conflict with EU data protection legislation.
Olympic Destroyer: A False Flag Confusion Bomb via ThreatPost
Security experts now believe a skilled and mysterious threat actor behind the malware intended to sow confusion among those attempting to assign attribution to the attack.
How Ryder Approaches Risk Management via Idenhaus
At the recent Executive Risk Summit, Amy Wagner, Director of Risk Management at Ryder, provided insight into how the company has managed growing cyber risk.
Ransomware: What Is It And How Can You Prevent It? via PixelPrivacy
This article looks at how ransomware can hold your computing device and its files hostage, how you can prevent ransomware from attacking your computer, and what you can do if you find that your data is being held hostage.
This half-day conference cited recent examples to identify these threats and shared how businesses can mitigate risk with technology, insurance, and training.
Understanding the Limitations of HTTPS via TextPlain
HTTPS is a necessary condition for secure browsing, but it is not a sufficient condition.
In this discussion of identity and access management technology and the digital ecosystem, we’re focusing on the role of the technology itself, especially innovative solutions for enabling interoperability with other parts of the ecosystem.
State lawmakers only decided to enforce net neutrality at the local level after ISPs convinced the FCC to abandon its nationwide oversight of net neutrality.
Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us