Thanks for reading our biweekly digest of Cybersecurity, Privacy, and Identity Management articles. We curate a diverse selection of IAM, Identity Governance, Cyber Risk, and RBAC articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.
This week’s news digest includes 9 informative cybersecurity, privacy, and access management articles from February 2019. Enjoy!
Cyber law attorney Doug Meal shares the 5 most common pre-breach cybersecurity mistakes companies make and how to avoid them.
The 3 Pillars of the Modern-Day SOC via Security Boulevard
How exactly should you approach building a modern-day SOC, and what does it look like in terms of techniques, talent, and tooling? There are three pillars that establish a solid foundation.
Imagine that you wanted to train a facial recognition algorithm on age-related characteristics and, more specifically, on age progression (e.g., how people are likely to look as they get older). Ideally, you’d want a broad and rigorous dataset with lots of people’s pictures. It would help if you knew they were taken a fixed number of years apart—say, 10 years.
Passed in June 2018 with an effective date of January 1, 2020, the CCPA is the most comprehensive general data privacy bill of its kind to pass in the United States at a state level. CCPA increases the transparency of the collection and selling of physical and digital data. Under CCPA, California residents will now have more choices and control over what happens to their personal information that companies collect.
How Password Security Can Improve Your Cloud Identity Management via SolutionsReview
Enterprises the world over obsess over their digital transformation and cloud adoption. However, a factor enterprises looking to embrace the cloud often fail to account for can either make or break their efforts: cloud identity management.
The flaws aren’t in the Bluetooth standard itself, but in its implementation in all sorts of software. Windows, Android, Linux, and iOS have been vulnerable to BlueBorne in the past. Millions could still be at risk.
In 2017, a typical healthcare organization suffered an average of 32,000 intrusion attacks per day, compared to 14,300 per day in other industries. Personal health information is 50 times more valuable on the black market than financial information.
Android Phones Can Get Hacked Just by Looking at a PNG Image via The Hacker News
Yes, just viewing an innocuous-looking image could hack your Android smartphone—thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Google’s mobile operating system, ranging from Android 7.0 Nougat to its current Android 9.0 Pie.
Creating an Identity & Access Management (IAM) roadmap is an important first step in helping your organization reap the full benefits of its IAM investment, as well as driving organizational understanding and support.
Check out our previous digest of Identity & Access Management articles here: 8 Must-Read Articles on Identity Governance & Access Management
An IAM Assessment is a quick, expert evaluation of your environment that identifies and addresses the most common issues organizations face when implementing a solution.
This is ideal for organizations that:
- Are struggling to get their IAM solutions deployed
- Have a misalignment between their processes and technology
- Have an immature IAM solution with too many workarounds
- Companies that want to accelerate their IAM programs
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us