Cybersecurity

7 Eye-Catching IAM & Cybersecurity Articles, October 2016

Selfies as passwords, the impossibility of DDoS protection, snail-paced cloud rollouts, and the flaw that makes the internet hackable. Every two weeks we release a curated digest of the most interesting and informative articles covering IAM, Cybersecurity, Governance, ICS/SCADA, compliance, privacy, and more across a range of industries. If you would prefer to receive this …

7 Eye-Catching IAM & Cybersecurity Articles, October 2016 Read More »

The Secret of Successful Vulnerability Management Programs

In the complex world of cybersecurity, a formal vulnerability management program is increasingly used to identify, communicate, and remediate key vulnerabilities across a wide range of facilities from office complexes to manufacturing plants. Vulnerability management is an old concept with a lot of understanding in a high-level capacity, but the execution of a full program …

The Secret of Successful Vulnerability Management Programs Read More »

14 Must-Read IDAM and Cybersecurity Articles, October 2016

Every two weeks we release a curated digest of the most interesting, time-sensitive, and informative articles covering IAM, Cybersecurity, ICS/SCADA, Infosec, compliance and privacy topics across a range of industries. Due to the popularity of our biweekly newsletter, we have expanded the digest on our blog to include a broader selection of articles to provide …

14 Must-Read IDAM and Cybersecurity Articles, October 2016 Read More »

2 Critical Considerations for Integrating OT/IT Integration

OT/IT Integration success can be attributed to three key elements: people, process, and technology. The integration of OT and IT environments is a challenging project for any organization. To help bring simplicity to this complex undertaking, an OT/IT integration can be analyzed through the lens of the cybersecurity triangle – people, process, and technology. These …

2 Critical Considerations for Integrating OT/IT Integration Read More »

9 Must-Read IDM and Cybersecurity Articles, September 2016

ICIT on Healthcare and Hacking Elections, Continuous Authentication, Cyber Wars, Government Decryption, and more. This week’s curated digest includes ICIT on healthcare cybersecurity, hacking the election, the future of IAM, the prevalence of insider threats, and five additional Identity & Access Management and Cybersecurity articles worth your attention. If you would prefer to receive a …

9 Must-Read IDM and Cybersecurity Articles, September 2016 Read More »

Why Process Is Essential for OT/IT Integration Success

IT/OT Integration success relies on alignment of people, process, and technology. Industrial control systems typically weren’t designed to be connected to the internet, so they weren’t built with cybersecurity capabilities to ward off hackers. –How to prevent hackers from taking down critical infrastructure, Business Insider Until recently, Operational Technology (OT) and IT departments operated completely separate …

Why Process Is Essential for OT/IT Integration Success Read More »

Top 8 IAM and Cybersecurity Articles, September 2016

Experian releases its 2016-2017 Data Breach Response Guide, Congressional report slams OPM on data breach, and more in this biweekly brief. If you would prefer to receive a shorter digest, please subscribe to the Idenhaus Identity Management & Cybersecurity newsletter (delivered every other Tuesday) here. Here are the top 8 Identity Management and Cybersecurity articles …

Top 8 IAM and Cybersecurity Articles, September 2016 Read More »

3 Essential Elements for IT/OT Integration Success

IT/OT Integration success can be attributed to three key elements: people, process, and technology. According to the U.S. Department of Homeland Security, operational technology (OT) operators were the most targeted sector of industrial cyber-attacks in 2015, making IT and OT integration more important than ever for industrial businesses. The introduction of networks into the industrial space …

3 Essential Elements for IT/OT Integration Success Read More »

Overcoming Operational Technology (OT) and IT Integration Challenges

In a recent vulnerability test, RedTeam Security was able to penetrate a US power grid – both online and offline – within a three day window. A quick Google search of cybersecurity and the energy sector will return thousands of results discussing how the industrial control system (ICS) security environment is in dire straights. Many …

Overcoming Operational Technology (OT) and IT Integration Challenges Read More »

Top 12 Trending Identity Management and Cybersecurity Articles

How many hours do you think it would take a hacker to hack your password? Did you hear about the “as bad as things get” Symantec software vulnerabilities? What about the newest exploits facing hospitals? To help you stay on top of the latest Identity Management and Cybersecurity news, we curated the top 12 articles in the past …

Top 12 Trending Identity Management and Cybersecurity Articles Read More »

Scroll to Top