Crisp Reading for the Fall Season: IAM Article Roundup

Share on linkedin
Share on twitter
Share on facebook

Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8 PM ET.

Crisp Reading for the Fall Season: Your IAM Article Roundup for Identity Access and Management Professionals

 

Op-Ed: Time for an International Standard for Port Cybersecurity via Maritime Executive

Chiming in from an important, and often overlooked cybersecurity sector: Ports. This Op-Ed gives a look into the current lack of oversight and how, using new industry guidelines as a model, requiring port facilities to conduct regular cybersecurity assessments and develop distinct cybersecurity plans can help keep everyone more secure.

 

Congress is Finally Going Big on Cyber via The Washington Post

After years of minimal effort on major cyber legislation, Congress is suddenly champing at the bit to get big, bold things done. And the government’s top cyber officials are cheering them on. The cause? The wave of economy-rattling ransomware attacks has created a greater sense of urgency about cybersecurity in Washington than ever before.

 

Is Cybersecurity Insurance Out of Reach for Government? via GovTech

As cyber attacks and ransom demands grow, cybersecurity insurance is becoming increasingly expensive for the insured and the insurer. The upward trajectory in cost has some experts wondering if the cybersecurity insurance market will remain economically viable.

 

More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic via  Dark Reading

Stay updated! Organizations that have not implemented controls for detecting malware hidden in encrypted network traffic are at risk of having a vast majority of malicious tools being distributed in the wild, hitting their endpoint devices.

 

Making The Case For Zero Trust  via Idenhaus

Still wondering what the fuss is about for Zero Trust? See why the older models of perimeter security aren’t good enough these days, in the age of the cloud and work-from-anywhere. With new frontiers come new threats, and also the chance to expand horizons and create new and wondrous things.

 

Check out our previous digest of articles for Identity Management Professionals, 6 Intriguing Reads for Identity Management and Cybersecurity.

To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

Follow @Idenhaus on Twitter and subscribe to our YouTube channel.



By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top