7 Identity Management and Cybersecurity Articles, February 2021

Share on linkedin
Share on twitter
Share on facebook

 IAM strategy, Solar Winds, and cyber insurance headline this week’s digest of Identity Management and Cybersecurity Articles.

7 Identity Management and Cybersecurity Articles, February 2021 (1)

Thanks for checking out this week’s digest of Identity Management and Cybersecurity articles. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

7 Identity Management and Cybersecurity Articles, February 2021

 

5 Benefits of an IAM Strategy via Idenhaus

Most organizations approach IAM projects from a tactical viewpoint, which is risky because it fails to consider how business processes must change to support identity lifecycle and often leads to project failure.

 

New malware found on 30,000 Macs has security pros stumped via ArsTechnica

A previously undetected piece of malware found on almost 30,000 Macs worldwide is generating intrigue in security circles, and security researchers are still trying to understand precisely what it does and what purpose its self-destruct capability serves.

 

Becoming a CISO: Many Paths to Success via BankInfoSecurity

Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.

 

New York regulator issues cyber insurance risk framework with implications for insurers and insureds via JDSupra

The Framework identifies best practices that property/casualty insurers “should employ” to manage cyber insurance risk and raises a number of issues relevant to multiple stakeholders including policyholders who rely on insurance as part of their cyber risk management strategy.

 

Tracker pixels in emails are now an ‘endemic’ privacy concern via ZDNet

Hansson told the publication that on average, the company processes one million emails and over 600,000 pixel tracker attempts are blocked every day. If you bring these levels up to the millions and millions of emails processed by services such as Gmail or Outlook, the suggestion that pixel tracker usage is “endemic” may be realistic.

 

Microsoft’s Smith: SolarWinds attack involved 1000 developers via DataBreachToday

More than 1,000 developers likely worked on rewriting code for the massive SolarWinds supply chain attack that affected many companies and U.S. government agencies, Microsoft President Brad Smith said in a Sunday interview, pointing out the attack is most likely continuing.

 

4 Fundamental Steps to Cybersecurity Planning Success via Idenhaus

The issue with cybersecurity planning is not that it is not being done at all; rather, the issue lies in how the planning exercise itself is executed. Most organizations look at planning through the lens of incremental improvement to their existing security measures and their current network infrastructure.

 

Check out our previous digest of Identity Management and Cybersecurity articles, 9 Identity Access and Cybersecurity Articles, February 2021

 

 

To receive the top Identity Management and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 



By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top