Zero Trust, cyber skills shortage, and quantum computing headline this week’s digest of cyber security articles.
Thanks for checking out this week’s digest of identity and cyber security articles. Click here to view the healthcare-focused digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.
9 Must-Read Cyber Security Articles, November 2020
Leveraging Zero Trust with Identity at the Core via Idenhaus
Zero Trust shifts the focus from protecting the corporate network to protecting individual resources. Authentication and authorization become discrete functions that are performed before any access to an enterprise resource is allowed.
Insecure APIs a Growing Risk for Organizations via DarkReading
Security models for application programming interfaces haven’t kept pace with requirements of a non-perimeter world, Forrester says.
One thing I’ve learned in business is that when it comes to existential risks, you may trust, but you must always verify. CEOs often have a poor understanding of strategic cyber risk. As a result, they don’t require critical additional security oversight controls to ensure they know the actual dimensions of the strategic risks associated with cyber.
Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave.
Cyber Security as Competitive Advantage via ChannelFutures
Cyber security may initially come to mind as a defensive position, but having strong cyber resilience can actually be a competitive advantage, especially when it’s at the forefront of your operations and embodies a commitment to customers.
New NAT/Firewall Bypass Attack Lets Hackers Access Any TCP/UDP Service via The Hacker News
New research has demonstrated a technique that allows an attacker to bypass firewall protection and remotely access any TCP/UDP service on a victim machine.
Supermarket aisles filled with fresh produce are probably not where you would expect to discover some of the first benefits of quantum computing.
Security-driven networking enables organizations to bridge the gap between dynamic networks and the usually static security tools available to secure them. By weaving security and networking functionality into a single, fully-integrated system, organizations can build whatever they want, regardless of how dynamic or scalable.
The Growing Threat of Business Email Compromise via Idenhaus
Business Email Compromise is a form of cybercrime in which an attacker gets control of a victim’s business email account and imitates the owner’s identity to defraud the company and its employees.
To receive the top identity and cloud security articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us