8 Must-Read Identity Management & Cybersecurity Articles, March 2018

Stay informed with the Idenhaus Consulting Identity Management & Cybersecurity digest. We curate the best IAM/IDM, IoT, Identity Governance, & Information Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.

Here are our favorite Access Management & Cybersecurity articles from early March 2018.

Salted Hash Ep 21: Scammers targeting Office 365 and DocuSign via CSO

On this week’s episode, Salted Hash talks with Barracuda’s Asaf Cidon about targeted scams leveraging Office 365 and DocuSign.

Why Workarounds Are IAM’s Silent Killer

A Sneak Peek at the New NIST Cybersecurity Framework  via DarkReading

Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

U.S. Cybersecurity Threat Risk Remains High — No Signs of Lessening via CSO

The U.S. Director National Intelligence says the public and private sectors in the U.S. are at continual risk and the country should expect cyber attacks from nation state and non-state actors.

In-the-wild DDoSes use new way to achieve unthinkable sizes  via ArsTechnica

Hackers have found a way to amplify distributed denial-of-service attacks by an unprecedented 51,000 times their original strength in a development that whitehats say could lead to new record-setting assaults that take out websites and Internet infrastructure.

6 Key Takeaways from EO Atlanta’s Cybersecurity for SMB 2018

Microsoft’s Supreme Court Case Has Big Implications For Data via Wired

U.S. v. Microsoft, which hinges on a law passed decades before the modern internet came into existence, could have broad consequences for how digital communications are accessed by law enforcement.

Securing the Web of Wearables, Smartphones & Cloud via DarkReading

Why security for the Internet of Things demands that businesses revamp their software development lifecycle.

Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share

Leave a Reply

Your email address will not be published. Required fields are marked *