IAM, security breach response, and social engineering headline today’s digest of IAM and Cybersecurity articles.
Thanks for checking out the biweekly digest of Identity Management and Cybersecurity articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest, delivered Tuesdays at 8 PM ET.
6 Must-Read Cybersecurity Articles, July 2020
3 Liability Risks from Security Breaches via Idenhaus
Here are the three most common areas of corporate liability risks from security breaches.
4 ways that HR teams can use Identity and Access Management (IAM) for secure remote working via BetaNews
There are a few areas where an identity and access management solution (IAM) can help those less technical individuals who are perhaps not quite so used to remote working get through the learning curve of using technology.
The Changing phase of Cybersecurity in 2020s via DQIndia
In the race to keep up with ever-evolving strains and attack modes, the onus of keeping our digital infrastructure secure can no longer lie solely with the IT team or the upper echelons of management but is now the responsibility of everyone in a company with access to a computer or smart device.
CCPA Enforcement Begins as AG Proposes Rules via JDSupra
The Attorney General began enforcing the California Consumer Privacy Act, meant to give consumers greater control over how businesses use their personal information, on July 1.
Social engineering hacks weaken cybersecurity during the pandemic via InfoWorld
In addition to capitalizing on rampant fear, uncertainty, and doubt, attackers are targeting a fresh new honeypot of federal aid, in the form of payouts from unemployment checks, stimulus checks, and the Paycheck Protection Program.
Role Based Access Control (RBAC) and Systems Thinking via Idenhaus
By focusing on the entire system, RBAC offers a solution that addresses a range of user access problems from initial provisioning (joiners), least privileges (movers), to revocation of access (leavers).
To receive the top IAM and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
Follow @Idenhaus on Twitter and subscribe to our YouTube channel.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us