Policy Based Access Control, IoT, and AI headline today’s digest of IAM and Cybersecurity articles.
Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity roundup. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources section for webinars, case studies, infographics, and educational videos.
Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest, delivered Tuesdays at 8 PM ET.
12 Must-Read Cybersecurity Articles, July 2020
What is Policy Based Access Control (PBAC)? via Idenhaus
PBAC solutions address the need to model security requirements, dynamically provision and configure security services, link operational security events to vulnerabilities, and impact assessments at the business level. The end goal is effective risk management because the likelihood of a successful attack increases as a user’s access increases.
The more cybersecurity tools an enterprise deploys, the less effective their defense is via ZDNet
On average, enterprises deploy 45 cybersecurity-related tools on their networks. The widespread use of too many tools may contribute to an inability not only to detect, but also to defend from active attacks. Enterprises that deploy over 50 tools ranked themselves 8% lower in their ability to detect threats, and 7% lower in their defensive capabilities, than other companies employing fewer toolsets.
Visa unveils AI tool to help stop digital identity fraud via TechRepublic
Advanced Identity Score is an effort to combine “Visa’s artificial intelligence and predictive machine learning capabilities with application and identity related data to generate a risk score for new account applications to help reduce fraud, prevent negative impact to brand loyalty and trust, and eliminate operational costs due to remediation.”
Why we need to solve our quantum security challenges via EuropeanSting
The most significant implications of this technological arms race are increasingly being felt by the global cybersecurity community. This is because quantum computing has the potential, if used maliciously, to break the systemically important cryptographic underpinnings of the infrastructure on which enterprises and the wider digital economy rely.
New Charges, Sentencing in Satori IoT Botnet Conspiracy via KrebsonSecurity
The U.S. Justice Department charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of thousands of routers and other IoT devices for use in large-scale DDoS attacks.
CCPA – Enforcement is coming, Ready or Not via NationalLawReview
With estimates that around 500 billion companies are impacted, and the enforcement deadline rapidly approaching on July 1, what key things should businesses be doing to minimize their risks?
CVE-2020-2021 PAN-OS: Authentication Bypass in SAML Authentication via PaloAltoNetworks
When Security Assertion Markup Language (SAML) authentication is enabled and the ‘Validate Identity Provider Certificate’ option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources.
Companies start reporting ransomware attacks as data breaches via BleepingComputer
Corporate victims are finally starting to realize that ransomware attacks are data breaches and have begun to notify employees and clients about data stolen data.
AWS dips into no-code. Can it reach critical mass? via CIODive
The new product hopes to give mid-management users an avenue to build apps quickly. But the solution lacks heft and must overcome usability hurdles as it enters a maturing space, analysts say.
Inside Ally Financial’s technology strategy via CIODive
In response to COVID-19 and stay-at-home orders, Ally was able to within two days launch an application to allow customers to apply for forbearance. Once a customer enrolled, it automatically connected to all the backend financial systems. It was all done in a weekend.
CPG, Meet IoT: How Connected Everything Could Transform the Industry via BuiltIn
Whether the applications are directly marketed to consumers or come to fruition behind the scenes, the potential use cases for IoT in the consumer packaged goods (CPG) industry are many.
Mastering Identity Management: When Your HRIS System Falls Short via Idenhaus
If your HRIS system is not an authoritative source for answers to your user identity questions, what should you do?
To receive the top IAM and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
Follow @Idenhaus on Twitter and subscribe to our YouTube channel.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us