Every two weeks we release a curated digest of the most interesting, time-sensitive, and informative articles covering IAM, Cybersecurity, ICS/SCADA, Infosec, compliance and privacy topics across a range of industries. Due to the popularity of our biweekly newsletter, we have expanded the digest on our blog to include a broader selection of articles to provide additional content that may be of interest to our subscribers. If you would prefer to receive a short digest, please subscribe to the Idenhaus Identity Management & Cybersecurity biweekly here.
Here are the top 14 Identity Management and Cybersecurity articles for early-October 2016.
Identity and Access Management
- 5 Reasons Why Privilege Needs Special Attention via IdentityWeek
- Global Mobile Identity Management Market 2016-2020 [Report] via PRNewswire
- The obstacles and challenges in managing privileged identities via CBR
- Constellation ShortList™ Cloud Identity Management via Constellation Research
National Security
- N.S.A. Contractor Arrested in Possible New Theft of Secrets via NYTimes
- FBI reports more attempts to hack voter registration system via NetworkWorld
- The Categorical Threat Landscape to Consider When Reading NASS’ Open Letter to Congress via ICIT
Cybersecurity
- 76% of security pros believe threat intelligence should be shared via SCMagazine
- Industrial IoT is inching toward a consensus on security via CSOOnline
- New York Cyber Conference Panelists Stress Importance of Unified Cybersecurity Plan via NetworkWorld
- Energy sector addressing cybersecurity threats via UPI
- Good Cybersecurity Can Be Good Marketing via HBR
Operational Technology
- 2 Critical Considerations for Integrating OT/IT Technology via Idenhaus
- Asset visibility and inventory: the starting point for OT security via PEI
“A Five Point Plan for Boards Addressing Cyber Risk” by The Chertoff Group from SecurityRoundtable.org on Vimeo.
Follow @Idenhaus on Twitter and signup for our biweekly newsletter.
Photo Credit: Flickr