August Articles for IAM Professionals

Share on linkedin
Share on twitter
Share on facebook

Ransomware and other threats are still on the rise in 2021, take a look at the fallout of Amazon’s surveillance, and remember that updating your software – and your information security policy – is important to your organization’s continued IT security. 

Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8 PM ET.

New Articles for Identity Management Professionals

 

Why Every Organization Needs Information Security Policies via Idenhaus

Idenhaus discusses the need for up-to-date and accurate Information Security Policies to keep organizations on the right cyber security path.

 NSA Warns Public Networks are Hacker Hotbeds via ThreatPost

The NSA urges security teams to be mindful of the wireless threats employees face when using Wi-Fi networks. It also lumps Bluetooth technology and NFC into its list of worrisome protocols.

3 Strategies to Secure Your Digital Supply Chain via Harvard Business Review

Today, most software products rely on thousands of prewritten packages produced by vendors or drawn from open source libraries. The most commonly used of these third-party software supply chain components are highly prized targets for cyber criminals.

 When It Comes to Security, All Software is ‘Critical’ Software via VentureBeat

Defining critical software has become a more complex task in recent years, as both tech professionals and government officials aim to contain or diminish the impact of cybersecurity breaches that are more difficult to label.

48 Advocacy Groups Call on the FTC to Ban Amazon Surveillance via Vice

The open letter uses Amazon as a case study to argue that corporate surveillance technologies cause immense harm and fall under the FTC’s authority to ban.

Check out our previous digest of articles for Identity Management Professionals, BiWeekly Roundup of Articles for IAM Professionals

To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

Follow @Idenhaus on Twitter and subscribe to our YouTube channel.

 



By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top