BiWeekly Roundup of Articles for IAM Professionals

Share on linkedin
Share on twitter
Share on facebook

‘Process Ghosting’, keeping up to date on the latest breaches and on the responses to those breaches in other sectors. All that and more in this week’s digest of articles for Identity Management Professionals.

Thanks for checking out this week’s digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

BiWeekly Curated Articles for Identity Management Professionals, July 2021

 

5 Common Pre-Breach Mistakes Organizations Make With Cyber Security via Idenhaus

Join us as we discuss the second mistake out of our series of five: the inadequate use of outside assessors when creating a strong security plan. When done correctly, outside assessments can help, but when incorrect…. they can hurt your organization more than you might think.

Researchers Uncover ‘Process Ghosting’ — A New Malware Evasion Technique via The Hacker News

Cybersecurity researchers have disclosed a new executable image tampering attack dubbed “Process Ghosting” that could be abused by an attacker to run malicious code on a Windows system.

CISA Under Pressure to Put More Teeth in Cyber Requirements Following Colonial Pipeline Attack via Federal News Network

CISA is facing calls to take a more muscular approach to its role overseeing the cybersecurity of critical infrastructure in the wake of the Colonial Pipeline attack and other ransomware incidents.

Kaseya: Assessment and Lessons Learned via TheCyberWire

CEO Fred Voccola assured customers that Kaseya was taking the incident very seriously, and delivered the unwelcome news that the fix the company was working on would be further delayed.

Oil & Gas Targeted in Year-Long Cyber-Espionage Campaign via ThreatPost

A global effort to steal information from energy companies is using sophisticated social engineering to deliver Agent Tesla and other RATs.

Bad Cybersecurity Behaviors Plaguing the Remote Workforce via HepNetSecurity

As organizations make plans for the post-pandemic hybrid workforce, the report reveals how security behaviors have shifted during the past year, the challenges as organizations transition to a hybrid work model, and why a fundamental shift in security priorities is required.

Check out our previous digest of articles for Identity Management Professionals, Early June Articles for Identity Management Professionals

To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

 

Follow @Idenhaus on Twitter and subscribe to our YouTube channel.

 



By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top