Identity Management Biweekly: New SIM Hack, IAM Roadmaps, Healthcare Cybersecurity

Share on linkedin
Share on twitter
Share on facebook

identity management biweekly

Thanks for reading the Idenhaus Identity Management biweekly news digest. Every two weeks, we curate a selection of informative IAM, Data Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos.

Subscribe to the Idenhaus biweekly newsletter here or the healthcare IT newsletter here.

Security Thought of the Week

The impact of Identity Management on profit is indirect, leading from better processes to better customer performance to higher returns.

Identity Management Biweekly: 9 Must-Read IAM & Cybersecurity Articles

 

IAM Roadmaps are Key to Secure Funding for Your IAM Project via Idenhaus

The process of building an IAM roadmap opens the lines of communication, establishes business priorities, and creates a shared understanding of the value delivered.

 

New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS via HackerNews

Cybersecurity researchers revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could allow remote attackers to compromise targeted mobile phones and spy on victims just by sending an SMS.

 

7 Critical Identity Management Questions Your Enterprise Needs to Ask via SolutionsReview

Instead of making a cautious selection, enterprises often pick a solution that seems to solve their immediate challenge. Obviously, this creates an identity management platform bogged down by complexity and integration issues.

 

More Than 70% of Hospital Data Breaches Puts Patients at Risk of Identity Theft  via FierceHealthcare

A recent Harvard T.H. Chan School of Public Health and Politico survey showed that only 17% of patients have a “great deal” of faith that their health plan will protect their data, and only 24% trust their hospital to keep their data safe.

 

Identity Governance: Why Enterprises Don’t Implement It? via Hackernoon

With something as huge as the modern enterprise environment, a highly complex IGA solution should be put to practice to correlate and monitor employee identities throughout its network.

 

Hackers are Changing their Approach to Healthcare Ransomware Attacks via HealthcareITNews

One cybersecurity expert offers his perspective on the changing threat landscape faced by CIOs and CISOs and gives some tips for more effective threat detection and response.

 

7 Free Learning Resources For Kubernetes via AnalyticsIndia

Kubernetes, the open-sourced container management system developed by tech giant Google has gained popularity by the developers in recent years. It has been used by a number of organizations and has a large community which provides support behind the system.

 

The Role of Analytics in Protecting Healthcare Data Privacy and Security via SecurityBoulevard

Insider threats pose the biggest challenges to healthcare organizations because they can happen without triggering any security alarms. A trusted employee can steal confidential patient and corporate information, or tamper with it, and even sabotage systems.

 

8 Benefits of an Identity & Access Management Roadmap  via Idenhaus

While many organizations do a good job of laying out their technical requirements, too often they fail to link their implementations to business outcomes and fail to build the right IAM foundation to solve the organization’s most pressing business problems.

 

Check out our previous Identity Management Biweekly: 8 Must-Read Identity Management & Cybersecurity Articles, September 2019

 

Upcoming Webinar: How to Secure Funding for Your IAM Program

Secure Funding for your IAM Program

If you are new to getting an IAM program funded, you may not feel comfortable talking to executives about the value the program brings to the organization. You may even think that a single meeting with your executive team will be enough to pitch the idea and get your budget approved on the spot.

 

Time for a reality check!

 

In this webinar, Hanno Ekdahl, Founder of Idenhaus Consulting, will take you through the essentials of the ‘fundraising process’. If you are interested in securing IAM funding, this webinar is a great opportunity to get an experienced perspective and to get your questions answered.

 

Can’t make this webinar on the scheduled day? No worries! Register anyway to receive the link to the webinar recording and listen later at your convenience. Reserve your spot today!

 

Follow @Idenhaus on Twitter and subscribe to our Identity Management biweekly or our healthcare IT biweekly newsletter.

 

Photo credit: American Nurse Today

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *