Blockchain, IoT, AI, and Biometrics headline this week’s cybersecurity and IAM news digest.
Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity roundup. Every 2 weeks, we curate a selection of IGA, Healthcare, Cybersecurity and Identity Management Articles. Check out our resources section for webinars, case studies, infographics, and educational videos.
To receive the top Cybersecurity and Identity Management articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.
Cybersecurity and Identity Management
The starting point for building a solid Identity Management (IAM) foundation begins with an assessment that includes identifying key stakeholders, core user management processes, authoritative data sources and points of integration both from a business and a technical point of view.
The government of South Korea’s planned city Sejong — which is the country’s testing ground for major smart city solutions — announced Friday that it will be establishing a blockchain-based platform for storing and verifying the digital identities of self-driving vehicles.
Optimizing IoT Security by Implementing Artificial Intelligence via Infosecurity Magazine
Implementing metaheuristic algorithms will provide a technical model that is applied in the IoT and can achieve impressive results. The proposed idea for the application of AI is the most efficient way of adding to the security of end-users, to the benefit of everyone.
“Since COVID has started, phishing attacks have increased 667%,” said Jolly, who indicated that Okta experienced an 80% increase in usage for just one of its products. “As COVID has suddenly poured gas on the fire, we’re seeing our customers reach out to us a lot more, needing more support.”
Healthcare IAM & Cybersecurity
4 Benefits Identity Management Offers Healthcare via Idenhaus
While there are many ways to address cybersecurity challenges in healthcare, let’s look at several features identity management solutions offer health organizations.
Smart Buildings Present a Unique Healthcare Cybersecurity Threat via HealthcareIT News
What are the steps healthcare CIOs and CISOs can take to analyze, design, evaluate and implement smart building solution plans to protect themselves from hackers getting to more important things like the main network or the electronic health records system?
Security pros are banding together to ensure healthcare facilities can focus on saving lives instead of defending against cyber attacks. Here are a few places you can volunteer your services.
HIMSSCast: Cybersecurity Implications of COVID-19 via HealthcareIT News
As healthcare systems around the world battle COVID-19, they haven’t stopped fighting another battle: the constant struggle against hackers and other security threats.
NEC Launches Dual Face Biometric and Fever Detection System for Access Control via BiometricUpdate
The new offering combines elevated body temperature (EBT) detection, detection of personal protective equipment, such as face masks, and NeoFace biometrics on a scalable and modular platform with video and thermal analytics.
Check out our previous digest IAM and cybersecurity articles, 10 Identity Management and Cybersecurity Articles, April 2020
To receive the top Cybersecurity and Identity Access Management articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.
[feature_box style=”33″ title=”Unlocking the Benefits of an IAM Roadmap
Are you using the right IAM solution to maximize your program’s value to your organization? How do you know which vendor is right for you? And how do you ultimately gain organizational buy-in? Join Idenhaus to learn how to evaluate the needs of your organization (people, process, technology) and the steps you can take to build a comprehensive, convincing IAM Roadmap to guide key stakeholders at your company from concept to reality.
In this webinar, you’ll learn:
– How to engage and empower your key stakeholders
– How to evaluate and prioritize the needs of your organization
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us