7 Insightful Identity Governance and Cybersecurity Articles

Share on linkedin
Share on twitter
Share on facebook

IAM trends, IoT privacy, and PBAC headline this week’s digest of Identity Governance and Cybersecurity Articles.

Identity Governance and Cybersecurity Articles

Thanks for checking out this week’s digest of Identity Governance and Cybersecurity articles. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

7 Insightful Identity Governance and Cybersecurity Articles, December 2020

 

Penetration Testing: Everything You Need to Know via Idenhaus

While no security system is guaranteed to be impenetrable, Penetration Testing is the first step in shoring up your defenses so hackers look elsewhere for an easier target.

 

SolarWinds attack is not ‘espionage as usual,’ Microsoft president says via CyberScoop

The breach of SolarWinds software that allowed widespread espionage on U.S. government agencies and other organizations worldwide is more than just a shocking use of digital spycraft, Microsoft’s top executive said Thursday.

 

How Pre-Processing will Become Critical for IoT Privacy via ElectroPages

With the rising use of IoT and the increasing pressure from governments, privacy in IoT is a significant factor for designers to consider. One solution is data pre-processing, but what is this, and how does it improve privacy?

 

Three key customer IAM trends for 2021 via SecurityMagazine

Looking ahead to 2021, the pandemic will continue to drive business interactions with consumers online. Customer identity and access management (CIAM) products should see explosive growth as these technologies will be essential for securing digital storefronts and providing enhanced experiences.

 

Why identity will be the innovation of the decade via ITProPortal

As businesses accelerate digital transformation initiatives to enable online customer onboarding at scale, digital identity verification becomes pivotal to knowing who they’re doing business with online.

 

SSO and MFA Are Only Half Your Identity Governance Strategy via Dark Reading

We need better ways to manage user identities for accessing applications, especially given the strain it places on overworked IT and security teams.

 

What is Policy Based Access Control (PBAC)? via Idenhaus

Learn how Policy Based Access Control (PBAC) combines semantic security risk management with a dynamic policy framework to mitigate security threats.

 

 

Check out our previous digest of Identity Governance and Cybersecurity articles, 16 Informative Identity Management Articles, December 2020

 

 

To receive the top identity and cloud security articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel

 


Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top