7 Articles for Identity Management Professionals, April 2021

Share on linkedin
Share on twitter
Share on facebook

Ransomware, Governance, and Access Control headline this week’s digest of articles for Identity Management Professionals.

7 Articles for Identity Management Professionals, April 2021

Thanks for checking out this week’s digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

7 Articles for Identity Management Professionals

 

7 Types of Identity Management Access Controls via Idenhaus

In this blog, we discuss the various security controls that are defined for information systems and the publications available that provide recommendations to mature your organization’s cybersecurity posture.

 

Do You Know Who IAM? Why Cloud Identity Is So Complicated via DarkReading

Excessive permissions and identity security are important. Solutions have existed for years to make them easier. So, why do so many failures still happen?

 

Hackers Exploit Known Sap Security Vulnerabilities With a Typical Cyber Attack Succeeding In Record Time via CPOMagazine

SAP and Onapsis researchers warned that threat actors could leverage faults in unsecured SAP applications exposed to the Internet to commit financial fraud, deploy ransomware, or disrupt business operations.

 

Financial industry preps for proposal that would require 36-hour breach notification via CyberScoop

Monday, April 12 marked the deadline for comments on an initial proposal that would mandate how a wide range of financial firms would need to report more kinds of cyber incidents to regulators within 36 hours.

 

The U.S. Government Needs to Overhaul Cybersecurity. Here’s How. via Lawfare Blog

It is time for a different model for cybersecurity. U.S. military bases have layers of walls, guards, badge readers, and authentication measures to control access. The United States needs the same mindset for its cybersecurity.

 

Hackers Exploit Unpatched VPNs to Install Ransomware on Industrial Targets via TheHackerNews

Unpatched Fortinet VPN devices are being targeted in a series of attacks against industrial enterprises in Europe to deploy a new strain of ransomware called “Cring” inside corporate networks.

 

10 Challenges IAM Governance Teams Help Organizations Overcome via Idenhaus

Establishing an IAM Governance Team helps address the most common challenges in implementing an enterprise-class Identity & Access Management solution.

 

 

Check out our previous digest of articles for Identity Management Professionals, 9 Identity Management Articles for Cybersecurity Professionals.

 

To receive the top Identity Management articles for Cybersecurity Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 



By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top