Thanks for reading the Idenhaus Identity Management biweekly news digest. Every 2 weeks, we curate a selection of IGA, Healthcare IT, Cybersecurity, Data Governance, Infosecurity, and IAM articles. Check out our resources section for webinars, case studies, infographics, and educational videos.
To receive the top Cybersecurity and IAM articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our healthcare IAM newsletter.
Idenhaus was named one of the 10 Most Promising Identity Governance and Administration Consulting/Service Companies 2019 by CIO Review!
Identity Management Biweekly: 9 Must-Read Cybersecurity and Healthcare IT Articles
Highlights from Gartner IAM Summit 2019 #GartnerIAM via Idenhaus
This year’s conference theme was “Keys to IAM Success: Multifactor Authentication, Privileged Access, and Beyond”. Many of the sessions focused on how an effective IAM program can help your business thrive in an era of unprecedented change.
State Of Software Security Report Highlights Struggle With Security Debt via Forbes
According to the report, “The largest amount of debt across applications comes from Cross-site Scripting (XSS), with Injection, Authentication, and Misconfiguration flaws making up sizable portions as well. We consider this noteworthy, as Injection is the second most prevalent flaw category in reported exploits.”
How Can IT Admins Maintain a Grip on Secure Access? via DevOps
Here are three steps executives should follow in order to keep their developers and IT admins happy.
Managing Identity in a ‘Zero Trust’ Environment via BankInfo Security
Why is identity at the core of the “zero trust” approach? Tejas Lagad of Nexus shares insights into the definition of zero trust; best practices to follow under zero trust; and why zero trust can play an important role.
The IMDRF Cybersecurity Guidance: A Comprehensive Analysis via Med Device Online
The International Medical Device Regulators Forum (IMDRF) published on Oct. 1, 2019, new draft guidance outlining responsibilities and best practices for medical device manufacturers, regulators, and end users.
Data Protection in the Healthcare Sector via OpenAccessGovernment
Data protection in the healthcare sector is an increasing cybersecurity concern. There is an increasing need to exchange and share patients’ health related information among different countries in order to provide better health services to citizens.
AI in Healthcare: With Great Power Comes Great Risk via DevProJournal
Artificial intelligence (AI) and machine earning (ML) stand to transform outcomes for stakeholders across the healthcare industry more directly than nearly any other technology since the discovery of antibiotics.
Different Decade, Same Healthcare Privacy and Security Problems? via DigitalHealth
As we approach the end of not only another year, but another decade, there are still way too many outstanding “old” issues related to cybersecurity and privacy in the health sector.
Role Based Access Control (RBAC) and Systems Thinking via Idenhaus
By focusing on the entire system, RBAC offers a solution that addresses a range of user access problems from initial provisioning (joiners), least privileges (movers), to revocation of access (leavers).
Check out our previous digest of cybersecurity and Healthcare IT articles, 10 Must-Read IAM and Healthcare Cybersecurity Articles
Follow @Idenhaus on Twitter and subscribe to our Identity Management biweekly or our healthcare IT biweekly newsletter.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us