Thanks for reading the Idenhaus Identity Management biweekly news digest. Every two weeks, we curate a selection of informative IAM, Data Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos.
Security Thought of the Week
The impact of Identity Management on profit is indirect, leading from better processes to better customer performance to higher returns.
Identity Management Biweekly: 9 Must-Read IAM & Cybersecurity Articles
The process of building an IAM roadmap opens the lines of communication, establishes business priorities, and creates a shared understanding of the value delivered.
Cybersecurity researchers revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could allow remote attackers to compromise targeted mobile phones and spy on victims just by sending an SMS.
7 Critical Identity Management Questions Your Enterprise Needs to Ask via SolutionsReview
Instead of making a cautious selection, enterprises often pick a solution that seems to solve their immediate challenge. Obviously, this creates an identity management platform bogged down by complexity and integration issues.
More Than 70% of Hospital Data Breaches Puts Patients at Risk of Identity Theft via FierceHealthcare
A recent Harvard T.H. Chan School of Public Health and Politico survey showed that only 17% of patients have a “great deal” of faith that their health plan will protect their data, and only 24% trust their hospital to keep their data safe.
Identity Governance: Why Enterprises Don’t Implement It? via Hackernoon
With something as huge as the modern enterprise environment, a highly complex IGA solution should be put to practice to correlate and monitor employee identities throughout its network.
Hackers are Changing their Approach to Healthcare Ransomware Attacks via HealthcareITNews
One cybersecurity expert offers his perspective on the changing threat landscape faced by CIOs and CISOs and gives some tips for more effective threat detection and response.
7 Free Learning Resources For Kubernetes via AnalyticsIndia
Kubernetes, the open-sourced container management system developed by tech giant Google has gained popularity by the developers in recent years. It has been used by a number of organizations and has a large community which provides support behind the system.
The Role of Analytics in Protecting Healthcare Data Privacy and Security via SecurityBoulevard
Insider threats pose the biggest challenges to healthcare organizations because they can happen without triggering any security alarms. A trusted employee can steal confidential patient and corporate information, or tamper with it, and even sabotage systems.
While many organizations do a good job of laying out their technical requirements, too often they fail to link their implementations to business outcomes and fail to build the right IAM foundation to solve the organization’s most pressing business problems.
Check out our previous Identity Management Biweekly: 8 Must-Read Identity Management & Cybersecurity Articles, September 2019
Upcoming Webinar: How to Secure Funding for Your IAM Program
If you are new to getting an IAM program funded, you may not feel comfortable talking to executives about the value the program brings to the organization. You may even think that a single meeting with your executive team will be enough to pitch the idea and get your budget approved on the spot.
Time for a reality check!
In this webinar, Hanno Ekdahl, Founder of Idenhaus Consulting, will take you through the essentials of the ‘fundraising process’. If you are interested in securing IAM funding, this webinar is a great opportunity to get an experienced perspective and to get your questions answered.
Can’t make this webinar on the scheduled day? No worries! Register anyway to receive the link to the webinar recording and listen later at your convenience. Reserve your spot today!
Photo credit: American Nurse Today
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us