16 Informative Identity Management Articles, December 2020

Identity Governance, IAM Acronyms, and Biometrics headline this week’s digest of IGA and cybersecurity articles.

16 Informative Identity Management Articles, December 2020

Thanks for checking out this week’s digest of IGA and cybersecurity articles. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

16 Informative Identity Management Articles, December 2020

Common Identity Management Acronyms via Idenhaus

It can be a challenge to keep up with all of the Identity Management acronyms floating around. We’ve compiled 50+ of the most commonly used acronyms along with what they represent.

 

How to Modernize Identity Governance and Administration via ComputerWeekly

Modernizing identity governance and administration (IGA) capabilities is essential for organizations to manage identities effectively to ensure they remain competitive, compliant and secure.

 

Why Biometrics Will Not Fix All Your Authentication Woes via HelpNetSecurity

There are several flaws, including one with potentially fatal implications, that organizations can’t and shouldn’t ignore when exploring biometric authentication.

 

Looking to Adopt Hybrid Cloud? Don’t Overlook Governance via CloudComputingNews

Delivering a good digital business experience to all your stakeholders – customers, employees and business partners – while managing risk requires the use of modern identity and access governance solutions.

 

Top cyber threats agencies should have on their radar via GCN

Since organizations transitioned to home offices, both the frequency and the severity of cyber threats have increased, and government agencies are taking note.

 

Why the Future Is Passwordless via DarkReading

Passwordless authentication gives IT teams the control they need while providing employees with a seamless login experience. Here’s why the future is passwordless.

 

Hacker Lexicon: What Is the Signal Encryption Protocol? via Wired

As the Signal protocol becomes the industry standard, it’s worth understanding what sets it apart from other forms of end-to-end encrypted messaging.

 

5 Most Promising Blockchain Use Cases for Cybersecurity via AnalyticsInsight

Businesses can effectively integrate blockchains into their cybersecurity initiatives at their fingertips if they know where to consider them to safeguard critical and sensitive data, cryptocurrency and other digital assets, and smart contracts. Let’s have a look at the five most promising blockchain use cases for cybersecurity.

 

Is your organization prepared for PCI DSS 4.0? via HelpNetSecurity

Designed to ensure that all companies securely transmit, store or process payment card data correctly, compliance to the Payment Card Industry Data Security Standard (PCI DSS) serves a critical purpose.

 

Why biometrics will not fix all your authentication woes via HelpNetSecurity

There are several flaws, including one with potentially fatal implications, that organizations can’t and shouldn’t ignore when exploring biometric authentication.

 

Top Cybersecurity Predictions For 2021 via Enterprise Security Magazine

Techniques for fake audio or video are now progressive enough to be weaponized and used to generate targeted content to manipulate stock prices, opinions, or worse.

 

CISA set to receive subpoena powers over ISPs in effort to track critical infrastructure vulnerabilities via SCMagazine

The Cybersecurity and Infrastructure Security Agency is set to receive new administrative authorities that will allow the agency to obtain subscriber information for vulnerable IT assets related to critical infrastructure.

 

Looking to adopt hybrid cloud? Don’t overlook governance via CloudComputingNews

Delivering a good digital business experience to all your stakeholders – customers, employees and business partners – while managing risk requires the use of modern identity and access governance solutions.

 

Cloud Security Threats for 2021 via DarkReading

Security in the cloud era is a priority — but the cloud has provided bad actors with a greater set of targets than ever, as well as with new tools to conduct attacks.

 

Tighter identity and asset management is essential to WFH security via SecurityMagazine

According to a Gartner survey, 74% of CFOs see WFH as an ongoing strategy, even after the pandemic abates, and intend to transition some employees to remote work permanently.

 

Best Practices for Role Based Access Control (RBAC) via Idenhaus

RBAC is best suited for organizations that have a mature Identity Governance and Administration (IGA) solution in place. The underpinnings of RBAC begin with tight integration between an organization’s HRIS system, its IGA solution, and end-user applications.

 

Check out our previous digest of IGA and Cybersecurity Articles, 11 Must-Read IGA and Cybersecurity Articles

 

 

To receive the top identity and cloud security articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top