Stay informed by receiving our biweekly Identity Management & Cybersecurity digest in your inbox. We curate high quality and relevant IAM & Cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here.
Here are the top Cybersecurity and Access Management articles from October 2017.
Equifax said that it had not yet started notifying the affected UK consumers because it did not think it was “appropriate”.
It’s not impossible to build a great in-house Identity Management team but it might require a different approach in your company’s hiring and training strategies.
List of Hacker and Cybersecurity Movies, 1969 to 2017 via Steve Morgan
The list of movies about hackers and cybersecurity is compiled annually and updated on the fly.
How to Properly Respond to a Cybersecurity Incident via Idenhaus
A significant factor in any cybersecurity incident is knowing when to react and to what degree. Poor threat intelligence can be a costly distraction for security teams that are short on resources.
It’s critical that companies help their employees understand the nuances of cyberthreats, and by giving them a safe place to simulate real-life situations, they are helping to prevent the next big data breach from human error.
Baker Donelson’s CISO Meetup Connects Startups & Decision Makers via AtlantaCyberWeek
Dozens of startups and entrepreneurs got to hear firsthand the challenges of cybersecurity procurement; best practices for navigating the procurement process and tips for ways to build relationships with influencers and decision makers.
Equifax: The Hazards of Dragnet Surveillance Capitalism Part 2: Just Another Data Breach? Or C-Suite Criminal Negligence? via ICIT
The Equifax breach should epitomize the consequences of negligent data brokerage and serve as a wake-up call to similar organizations who profit from dragnet surveillance and the employment of psychographic and demographic Big Data algorithms.
Virtual assistants are handy, but they’re always listening. You may wonder how much your devices are recording. And what happens to the audio files they gather?
Photo credit: Flickr
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us