12 Must-Read Cybersecurity Articles, July 2020

Share on linkedin
Share on twitter
Share on facebook

Policy Based Access Control, IoT, and AI headline today’s digest of IAM and Cybersecurity articles. 

Cybersecurity Articles

Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity roundup. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources section for webinars, case studies, infographics, and educational videos.

Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest, delivered Tuesdays at 8 PM ET.

Learning about Policy Based Access Control (PBAC) Webinar

 

12 Must-Read Cybersecurity Articles, July 2020

 

What is Policy Based Access Control (PBAC)? via Idenhaus

PBAC solutions address the need to model security requirements, dynamically provision and configure security services, link operational security events to vulnerabilities, and impact assessments at the business level. The end goal is effective risk management because the likelihood of a successful attack increases as a user’s access increases.

 

The more cybersecurity tools an enterprise deploys, the less effective their defense is via ZDNet

On average, enterprises deploy 45 cybersecurity-related tools on their networks. The widespread use of too many tools may contribute to an inability not only to detect, but also to defend from active attacks. Enterprises that deploy over 50 tools ranked themselves 8% lower in their ability to detect threats, and 7% lower in their defensive capabilities, than other companies employing fewer toolsets.

 

Visa unveils AI tool to help stop digital identity fraud via TechRepublic

Advanced Identity Score is an effort to combine “Visa’s artificial intelligence and predictive machine learning capabilities with application and identity related data to generate a risk score for new account applications to help reduce fraud, prevent negative impact to brand loyalty and trust, and eliminate operational costs due to remediation.”

 

Why we need to solve our quantum security challenges via EuropeanSting

The most significant implications of this technological arms race are increasingly being felt by the global cybersecurity community. This is because quantum computing has the potential, if used maliciously, to break the systemically important cryptographic underpinnings of the infrastructure on which enterprises and the wider digital economy rely.

 

New Charges, Sentencing in Satori IoT Botnet Conspiracy via KrebsonSecurity

The U.S. Justice Department charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of thousands of routers and other IoT devices for use in large-scale DDoS attacks.

 

CCPA – Enforcement is coming, Ready or Not via NationalLawReview

With estimates that around 500 billion companies are impacted, and the enforcement deadline rapidly approaching on July 1, what key things should businesses be doing to minimize their risks?

 

CVE-2020-2021 PAN-OS: Authentication Bypass in SAML Authentication via PaloAltoNetworks

When Security Assertion Markup Language (SAML) authentication is enabled and the ‘Validate Identity Provider Certificate’ option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources.

 

Companies start reporting ransomware attacks as data breaches via BleepingComputer

Corporate victims are finally starting to realize that ransomware attacks are data breaches and have begun to notify employees and clients about data stolen data.

 

AWS dips into no-code. Can it reach critical mass? via CIODive

The new product hopes to give mid-management users an avenue to build apps quickly. But the solution lacks heft and must overcome usability hurdles as it enters a maturing space, analysts say.

 

Inside Ally Financial’s technology strategy via CIODive

In response to COVID-19 and stay-at-home orders, Ally was able to within two days launch an application to allow customers to apply for forbearance. Once a customer enrolled, it automatically connected to all the backend financial systems. It was all done in a weekend.

 

CPG, Meet IoT: How Connected Everything Could Transform the Industry via BuiltIn

Whether the applications are directly marketed to consumers or come to fruition behind the scenes, the potential use cases for IoT in the consumer packaged goods (CPG) industry are many.

 

Mastering Identity Management: When Your HRIS System Falls Short via Idenhaus

If your HRIS system is not an authoritative source for answers to your user identity questions, what should you do?

 

Check out our previous digest IAM and cybersecurity articles, 14 Must-Read IAM and Cybersecurity Articles, June 2020

 

To receive the top IAM and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top