9 Must-Read Cybersecurity, Privacy, and IAM Articles, February 2019

cybersecurity privacy

Thanks for reading our biweekly digest of Cybersecurity, Privacy, and Identity Management articles. We curate a diverse selection of IAM, Identity Governance, Cyber Risk, and RBAC articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.

This week’s news digest includes 9 informative cybersecurity, privacy, and access management articles from February 2019. Enjoy!

 

5 Most Common Pre-Breach Cybersecurity Mistakes and How to Avoid Them via Idenhaus

Cyber law attorney Doug Meal shares the 5 most common pre-breach cybersecurity mistakes companies make and how to avoid them.

The 3 Pillars of the Modern-Day SOC via Security Boulevard

How exactly should you approach building a modern-day SOC, and what does it look like in terms of techniques, talent, and tooling? There are three pillars that establish a solid foundation.

Facebook’s ’10 Year Challenge’ Is Just a Harmless Meme—Right? via Wired

Imagine that you wanted to train a facial recognition algorithm on age-related characteristics and, more specifically, on age progression (e.g., how people are likely to look as they get older). Ideally, you’d want a broad and rigorous dataset with lots of people’s pictures. It would help if you knew they were taken a fixed number of years apart—say, 10 years.

The Clock is Ticking: CCPA 101 and How to Comply Before January 2020 via NTSC

Passed in June 2018 with an effective date of January 1, 2020, the CCPA is the most comprehensive general data privacy bill of its kind to pass in the United States at a state level. CCPA increases the transparency of the collection and selling of physical and digital data. Under CCPA, California residents will now have more choices and control over what happens to their personal information that companies collect.

How Password Security Can Improve Your Cloud Identity Management via SolutionsReview

Enterprises the world over obsess over their digital transformation and cloud adoption. However, a factor enterprises looking to embrace the cloud often fail to account for can either make or break their efforts: cloud identity management.

Hey, Turn Bluetooth Off When You’re Not Using It via Wired

The flaws aren’t in the Bluetooth standard itself, but in its implementation in all sorts of software. Windows, Android, Linux, and iOS have been vulnerable to BlueBorne in the past. Millions could still be at risk.

Confronting One Of Healthcare’s Biggest Challenges: Cyber Risk  via Forbes

In 2017, a typical healthcare organization suffered an average of 32,000 intrusion attacks per day, compared to 14,300 per day in other industries. Personal health information is 50 times more valuable on the black market than financial information.

Android Phones Can Get Hacked Just by Looking at a PNG Image  via The Hacker News

Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile operating system, ranging from Android 7.0 Nougat to its current Android 9.0 Pie.

8 Benefits of an Identity & Access Management Roadmap  via Idenhaus

Creating an Identity & Access Management (IAM) roadmap is an important first step in helping your organization reap the full benefits of its IAM investment, as well as driving organizational understanding and support.

 

Check out our previous digest of Identity & Access Management articles here: 8 Must-Read Articles on Identity Governance & Access Management

 

An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.

This is ideal for organizations that:

  • Are struggling to get their IAM solutions deployed
  • Have a misalignment between their processes and technology
  • Have an immature IAM solution with too many workarounds
  • Companies that want to accelerate their IAM programs

Click here to learn more about the IAM Assessment.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share

Leave a Reply

Your email address will not be published. Required fields are marked *