This week’s Idenhaus Identity Management & Cybersecurity Review features a wide-array of topics covering identity access control, ICS, cyber insurance, and the threat landscape. Stay informed by signing up for our biweekly review of the most important IAM & Cybersec news. Subscribe to our biweekly newsletter.
Here are the top 8 Cybersecurity and Access Management articles from early May 2017. Enjoy!
5 Questions You Need To Ask Yourself Before Choosing an IAM Solution via SolutionsReview
When researching new enterprise technology solutions, it’s always a good idea to gaze into the crystal ball and try to gauge what you might require in a solution down the road a few years.
The biggest cybersecurity threat facing federal agencies is legacy IT via CyberScoop
The biggest concern with legacy IT is that the bulk of today’s cyber spending is focused on preventing attackers from getting in the “house” or the infrastructure layer.
ICIT Analysis: Sowing the Seeds of U.S. Cyber Talent via ICIT
As the United States grapples with a projected shortage of 1.5 million cybersecurity professionals by 2020, the “digital generation” provides a unique opportunity to address the cyber-talent shortage.
Homebrew crypto SNAFU on electrical grid sees GE rush patches via The Register
General Electric is pushing patches for protection relay bugs that, if exploited, could open up transmission systems to a grid-scale attack.
Why SMBs are at high risk for ransomware attacks, and how they can protect themselves via TechRepublic
Ransomware cost businesses more than $1B last year, and SMBs are particularly susceptible to attack. Here are some tips and best practices for keeping your company safe.
10 Cybercrime Myths that Could Cost You Millions via DarkReading
Don’t let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.
How the insurance industry could change the game for security via CSO
The recent growth in the cyber insurance market is already improving cybersecurity in some industry segments, and has the potential to do more — if the industry is able to address its data problem.
5 Steps to Reviving a Frankenstein Network Architecture via Idenhaus
Much like the story of Frankenstein, today’s networking environments offer their own horror story of legacy technologies cobbled together to form sub-optimal architectures.
Click here to subscribe to the blog
Follow @Idenhaus and connect with Hanno on LinkedIn.
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us