Privacy law, IoT devices, and IAM resources headline this week’s digest of Identity Management and Cybersecurity Articles.
Thanks for checking out this week’s digest of Identity Management and Cybersecurity articles. Click here to view the healthcare-focused digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.
9 Identity Management and Cybersecurity Articles, January 2021
Let’s take a look at our most popular Identity Management resources and articles from 2020, in no particular order.
A year full of firsts, 2020 introduced a number of new consumer data privacy protection laws. We highlight significant data privacy developments and trends from 2020 in this post.
Cyber Standards for Connected Devices Leverage Federal Purchases via BloombergLaw
The standards, which under the law must be finalized in early 2021, are likely to prompt makers of internet-connected devices to step up their security so they can sell to the government.
Report on Russian Cyber Units via USNI
Russia has deployed sophisticated cyber capabilities to conduct disinformation, propaganda, espionage, and destructive cyberattacks globally.
Common Identity Management Acronyms via Idenhaus
From ABAC to XML, here are the most common identity management acronyms.
Quantum computing promises to transform cybersecurity, but there are substantial challenges to address and fundamental breakthroughs still required to be made.
Bugs in Firefox, Chrome, Edge Allow Remote System Hijacking via ThreatPost
Major browsers get an update to fix separate bugs that both allow for remote attacks, which could potentially allow hackers to takeover targeted devices.
The 15 Top Identity Management Articles of 2020 via SolutionsReview
The editors of Solutions Review work to research identity management on a constant basis. We compile technology research papers and reports, product updates, and capability trends. So, we compiled some of our top identity management articles and best practices released in 2020 to simplify the research process.
Leveraging Zero Trust with Identity at the Core via Idenhaus
Zero Trust shifts the focus from protecting the corporate network to protecting individual resources. Authentication and authorization become discrete functions that are performed before any access to an enterprise resource is allowed.
To receive the top identity and cloud security articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us