Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8 PM ET.
Crisp Reading for the Fall Season: Your IAM Article Roundup for Identity Access and Management Professionals
Op-Ed: Time for an International Standard for Port Cybersecurity via Maritime Executive
Chiming in from an important, and often overlooked cybersecurity sector: Ports. This Op-Ed gives a look into the current lack of oversight and how, using new industry guidelines as a model, requiring port facilities to conduct regular cybersecurity assessments and develop distinct cybersecurity plans can help keep everyone more secure.
Congress is Finally Going Big on Cyber via The Washington Post
After years of minimal effort on major cyber legislation, Congress is suddenly champing at the bit to get big, bold things done. And the government’s top cyber officials are cheering them on. The cause? The wave of economy-rattling ransomware attacks has created a greater sense of urgency about cybersecurity in Washington than ever before.
Is Cybersecurity Insurance Out of Reach for Government? via GovTech
As cyber attacks and ransom demands grow, cybersecurity insurance is becoming increasingly expensive for the insured and the insurer. The upward trajectory in cost has some experts wondering if the cybersecurity insurance market will remain economically viable.
More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic via Dark Reading
Stay updated! Organizations that have not implemented controls for detecting malware hidden in encrypted network traffic are at risk of having a vast majority of malicious tools being distributed in the wild, hitting their endpoint devices.
Making The Case For Zero Trust via Idenhaus
Still wondering what the fuss is about for Zero Trust? See why the older models of perimeter security aren’t good enough these days, in the age of the cloud and work-from-anywhere. With new frontiers come new threats, and also the chance to expand horizons and create new and wondrous things.
Check out our previous digest of articles for Identity Management Professionals, 6 Intriguing Reads for Identity Management and Cybersecurity.
To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
Follow @Idenhaus on Twitter and subscribe to our YouTube channel.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.