7 Must-Read IDM & Cybersecurity Articles, December 2016

New PCI Regulations, Benefits of Identity Management, Detection vs Prevention, and Threat Intelligence

22685900813_89ecddc20d_z

Every two weeks we release a curated digest of the most interesting and informative articles covering IAM, Cybersecurity, Governance, ICS/SCADA, compliance, privacy, and more across a range of industries. If you would prefer to receive this a day earlier, please subscribe to the Idenhaus Identity Management & Cybersecurity biweekly here.

Here are 7 articles worth your attention from late November/early December 2016.

Get a Jump Start on Meeting the New PCI Regulations
via CIOOnline

A robust unified identity management solution can help organizations meet most the requirements. Such a solution not only provides security controls to manage and constrain privileged user access to PCI DSS systems and data, but also helps reduce PCI scope and bolster mechanisms in anticipation of future PCI DSS changes.

 

Why privileged identity management needs to take the driving seat
via Information Age

The obstacle for many companies is figuring out what to do with privileged identity management (PIM) and acknowledging that these accounts often hold the “keys to the kingdom” and need to be treated accordingly. A big part of the challenge is simply the way we think about it.

Is an Ounce of Cybersecurity Prevention Worth a Pound of Cure?

Protecting Your Digital Life in 7 Easy Steps
via NYTimes

There are more reasons than ever to understand how to protect your personal information. Here are 7 excellent tips to better safeguard your digital identity.

 

Overcoming Event Fatigue: ICIT Programs Offer a Platform for True Thought Leader Collaboration
via ICIT

The rapid outbreak of cyber threats over the past few years has resulted in an abundance of events that promote faux experts and ineffective silver bullet solutions. This epidemic has led to a state of “event fatigue” among cybersecurity leaders. Enter ICIT Programs, a series of next-generation educational experiences produced and delivered by the Institute and its Fellows and built around the cutting edge, objective research.

 

Who’s Next, After San Francisco’s Public Transit System Got Hacked?
via NBC

The ransomware threat is so pervasive that the FBI even issued a warning in April, saying “Ransomware attacks are not only proliferating, they’re becoming more sophisticated.”

Threat Intelligence In Practice

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

Photo credit: Flickr


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us today!

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top