6 Must-Read Cybersecurity Articles, July 2020

Share on linkedin
Share on twitter
Share on facebook

IAM, security breach response, and social engineering headline today’s digest of IAM and Cybersecurity articles. 

cybersecurity articles

Thanks for checking out the biweekly digest of Identity Management and Cybersecurity articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest, delivered Tuesdays at 8 PM ET.

 

6 Must-Read Cybersecurity Articles, July 2020

 

3 Liability Risks from Security Breaches via Idenhaus

Here are the three most common areas of corporate liability risks from security breaches.

 

4 ways that HR teams can use Identity and Access Management (IAM) for secure remote working via BetaNews

There are a few areas where an identity and access management solution (IAM) can help those less technical individuals who are perhaps not quite so used to remote working get through the learning curve of using technology.

 

The Changing phase of Cybersecurity in 2020s via DQIndia

In the race to keep up with ever-evolving strains and attack modes, the onus of keeping our digital infrastructure secure can no longer lie solely with the IT team or the upper echelons of management but is now the responsibility of everyone in a company with access to a computer or smart device.

 

CCPA Enforcement Begins as AG Proposes Rules via JDSupra

The Attorney General began enforcing the California Consumer Privacy Act, meant to give consumers greater control over how businesses use their personal information, on July 1.

 

Social engineering hacks weaken cybersecurity during the pandemic via InfoWorld

In addition to capitalizing on rampant fear, uncertainty, and doubt, attackers are targeting a fresh new honeypot of federal aid, in the form of payouts from unemployment checks, stimulus checks, and the Paycheck Protection Program.

 

Role Based Access Control (RBAC) and Systems Thinking via Idenhaus

By focusing on the entire system, RBAC offers a solution that addresses a range of user access problems from initial provisioning (joiners), least privileges (movers), to revocation of access (leavers).

Check out our previous digest IAM and cybersecurity articles, 12 Must-Read Cybersecurity Articles, July 2020
Did you miss our webinar on Policy Based Access Control? It’s now available on-demand! Click here to access Learning about Policy Based Access Control (PBAC).
learning about policy based access control (pbac)

 

To receive the top IAM and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top