Watch a US Power Grid get hacked, learn how Troy Hunt verifies data “breaches”, and check out Anton Chuvakin’s new “Understanding Insider Threats” paper in this week’s Identity Management and Cybersecurity digest.
Get this biweekly update delivered a day earlier by signing up for our newsletter.
While the healthcare industry grapples with data breaches and privacy and security regulations, there are common pitfalls that are easy to run into without proper planning. Erin Whaley, a partner at the law firm Troutman Sanders, shared 6 tips for avoiding them. Read more >>
With the recent headlines alluding to major inbox providers being hacked, Troy Hunt focuses on how he verifies data breaches to ensure that when reporters cover them, they report accurately and in a way that doesn’t perpetuate FUD. Read more >>
A recent announcement of an authentication bypass should be enough to cause some pause on the topic of Office 365 security. There are a number of baseline security actions to take in Office 365 to help mitigate some of these risks. Read more >>
Please welcome “Understanding Insider Threats” by Erik Heidt and Anton Chuvakin, which is based on a large study of 186 organizations and their approaches to The Insider Threat. Read more >>
It turned out to be a perfect fit for PacifiCorp, one of the American West’s leading utilities. The “It” is a unique biometric authentication engine that can perform full ID verification without use of batteries or fixed power supply. Read more >>
The FDIC is kicking its cybersecurity efforts into high gear after reporting 5 more security incidents that were unknowingly caused by outgoing employees. Read more >>
IBM will collaborate with 8 universities with renowned cybersecurity programs. Watson “will rapidly search massive volumes of information, understand the arcane language of software security, and will provide the human analyst with a variety of options ranked by confidence.” Read more >>
If you enjoyed these articles, signup below to get the Idenhaus Identity Management & Cybersecurity News delivered to your inbox.
Photo Credit: Flickr