IAM trends, IoT privacy, and PBAC headline this week’s digest of Identity Governance and Cybersecurity Articles.
Thanks for checking out this week’s digest of Identity Governance and Cybersecurity articles. Click here to view the healthcare-focused digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.
7 Insightful Identity Governance and Cybersecurity Articles, December 2020
Penetration Testing: Everything You Need to Know via Idenhaus
While no security system is guaranteed to be impenetrable, Penetration Testing is the first step in shoring up your defenses so hackers look elsewhere for an easier target.
The breach of SolarWinds software that allowed widespread espionage on U.S. government agencies and other organizations worldwide is more than just a shocking use of digital spycraft, Microsoft’s top executive said Thursday.
How Pre-Processing will Become Critical for IoT Privacy via ElectroPages
With the rising use of IoT and the increasing pressure from governments, privacy in IoT is a significant factor for designers to consider. One solution is data pre-processing, but what is this, and how does it improve privacy?
Three key customer IAM trends for 2021 via SecurityMagazine
Looking ahead to 2021, the pandemic will continue to drive business interactions with consumers online. Customer identity and access management (CIAM) products should see explosive growth as these technologies will be essential for securing digital storefronts and providing enhanced experiences.
Why identity will be the innovation of the decade via ITProPortal
As businesses accelerate digital transformation initiatives to enable online customer onboarding at scale, digital identity verification becomes pivotal to knowing who they’re doing business with online.
SSO and MFA Are Only Half Your Identity Governance Strategy via Dark Reading
We need better ways to manage user identities for accessing applications, especially given the strain it places on overworked IT and security teams.
What is Policy Based Access Control (PBAC)? via Idenhaus
Learn how Policy Based Access Control (PBAC) combines semantic security risk management with a dynamic policy framework to mitigate security threats.
To receive the top identity and cloud security articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us