Stay informed with the Idenhaus Consulting Identity Management & Cybersecurity digest. We curate the best IAM/IDM, IoT, Identity Governance, & Information Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are our favorite Access Management & Cybersecurity articles from early March 2018.
On this week’s episode, Salted Hash talks with Barracuda’s Asaf Cidon about targeted scams leveraging Office 365 and DocuSign.
A Sneak Peek at the New NIST Cybersecurity Framework via DarkReading
Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.
The U.S. Director National Intelligence says the public and private sectors in the U.S. are at continual risk and the country should expect cyber attacks from nation state and non-state actors.
In-the-wild DDoSes use new way to achieve unthinkable sizes via ArsTechnica
Hackers have found a way to amplify distributed denial-of-service attacks by an unprecedented 51,000 times their original strength in a development that whitehats say could lead to new record-setting assaults that take out websites and Internet infrastructure.
U.S. v. Microsoft, which hinges on a law passed decades before the modern internet came into existence, could have broad consequences for how digital communications are accessed by law enforcement.
Securing the Web of Wearables, Smartphones & Cloud via DarkReading
Why security for the Internet of Things demands that businesses revamp their software development lifecycle.
Also, be sure to download my new, FREE digital book entitled Reimagining Identity Management: How To Design, Choose And Implement The Right IAM Solution For Your Business.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us