ALL

14 Must-Read IDAM and Cybersecurity Articles, October 2016

Every two weeks we release a curated digest of the most interesting, time-sensitive, and informative articles covering IAM, Cybersecurity, ICS/SCADA, Infosec, compliance and privacy topics across a range of industries. Due to the popularity of our biweekly newsletter, we have expanded the digest on our blog to include a broader selection of articles to provide […]

14 Must-Read IDAM and Cybersecurity Articles, October 2016 Read More »

2 Critical Considerations for Integrating OT/IT Integration

OT/IT Integration success can be attributed to three key elements: people, process, and technology. The integration of OT and IT environments is a challenging project for any organization. To help bring simplicity to this complex undertaking, an OT/IT integration can be analyzed through the lens of the cybersecurity triangle – people, process, and technology. These

2 Critical Considerations for Integrating OT/IT Integration Read More »

9 Must-Read IDM and Cybersecurity Articles, September 2016

ICIT on Healthcare and Hacking Elections, Continuous Authentication, Cyber Wars, Government Decryption, and more. This week’s curated digest includes ICIT on healthcare cybersecurity, hacking the election, the future of IAM, the prevalence of insider threats, and five additional Identity & Access Management and Cybersecurity articles worth your attention. If you would prefer to receive a

9 Must-Read IDM and Cybersecurity Articles, September 2016 Read More »

Why Process Is Essential for OT/IT Integration Success

IT/OT Integration success relies on alignment of people, process, and technology. Industrial control systems typically weren’t designed to be connected to the internet, so they weren’t built with cybersecurity capabilities to ward off hackers. –How to prevent hackers from taking down critical infrastructure, Business Insider Until recently, Operational Technology (OT) and IT departments operated completely separate

Why Process Is Essential for OT/IT Integration Success Read More »

Top 8 IAM and Cybersecurity Articles, September 2016

Experian releases its 2016-2017 Data Breach Response Guide, Congressional report slams OPM on data breach, and more in this biweekly brief. If you would prefer to receive a shorter digest, please subscribe to the Idenhaus Identity Management & Cybersecurity newsletter (delivered every other Tuesday) here. Here are the top 8 Identity Management and Cybersecurity articles

Top 8 IAM and Cybersecurity Articles, September 2016 Read More »

3 Essential Elements for IT/OT Integration Success

IT/OT Integration success can be attributed to three key elements: people, process, and technology. According to the U.S. Department of Homeland Security, operational technology (OT) operators were the most targeted sector of industrial cyber-attacks in 2015, making IT and OT integration more important than ever for industrial businesses. The introduction of networks into the industrial space

3 Essential Elements for IT/OT Integration Success Read More »

9 Identity Management & Cybersecurity Articles for IT Pros

Security weaknesses in the US critical infrastructure, POS and supply chain systems, and biometric facial recognition headline the Idenhaus Identity Management and Cybersecurity digest for August 23, 2016. If you would prefer to receive a short digest, please subscribe to the Idenhaus Identity Management & Cybersecurity biweekly here. Here are the top 9 Identity Management

9 Identity Management & Cybersecurity Articles for IT Pros Read More »

Top 10 Identity Management & Cybersecurity Articles, August 2016

Every two weeks we curate the top Identity Management and Cybersecurity articles from around the industry. Today’s digest covers topics from OT/IT collaboration to DDoS and ransomware to biometrics and digital identity. Check out these 10 must-read IAM and cybersecurity articles from early August 2016. If you would prefer to receive an even shorter digest, please subscribe

Top 10 Identity Management & Cybersecurity Articles, August 2016 Read More »

Overcoming Operational Technology (OT) and IT Integration Challenges

In a recent vulnerability test, RedTeam Security was able to penetrate a US power grid – both online and offline – within a three day window. A quick Google search of cybersecurity and the energy sector will return thousands of results discussing how the industrial control system (ICS) security environment is in dire straights. Many

Overcoming Operational Technology (OT) and IT Integration Challenges Read More »

Scroll to Top