Thanks, as always, for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8PM ET.
New Federal Reporting Requirements Demand Timely and Accurate Cyber-intelligence via CPO Magazine
Cybercrime within the financial services sector is evolving at the speed of innovation, sometimes outpacing the progress of cybersecurity. When the criminals are motivated, and the reporting is slim, how are we to know the real scope of the problem? New Federal Reserve and FDIC requirements for reporting cybersecurity incidents aims to keep investors secure in the knowledge that their transactions are covered.
California Privacy Rules Target Dark Patterns Through Technology Design via CybersecurityDive
There are big changes to California’s Consumer Privacy Act (CCPA) coming up due by the start of next year. Close cooperation between legal and IT will be necessary, as some of the most important requirements in the California Privacy Rights Act (CPRA), which was enacted in 2020 to strengthen CCPA consumer protections, links compliance with website and app design. How will this affect your app design in the future, even if you’re not California based? Let’s dive in.
Top 10 Enterprise Data Security Best Practices via TechTarget
To protect your organization’s data and prevent its misuse, incorporate these 10 data security best practices into your enterprise data security strategy. Want a more tailored view of what your organization needs in order to stay cyber-secure? Talk to Idenhaus today – our experts can help tailor a cybersecurity plan to your organization’s needs, and help keep those plans up to date.
Authentication Weakness Responsible for 80% of Financial Breaches via SCMedia
Despite the ongoing move to multi-factor authentication (MFA), the financial sector still faces a significant problem when it comes to breaches related to identification compromise. How can your organization move to MFA? Talk to the experts at Idenhaus- whether you want MFA, ZTA, or just to talk about your overall cybersecurity structure, Idenhaus is here to help.
Attack Surface Management via Idenhaus
Do you have 100% of your organization’s attack surface inventoried? While it may seem like a Sisyphus-level task to keep up with attack vectors today, the reality of the matter is that you have to keep up with them, or the threat actors will find a way into your best laid cybersecurity plans. Don’t let it happen to you! Talk to Idenhaus’ experts today!
To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
Follow @Idenhaus on Twitter and subscribe to our YouTube channel. Don’t forget to peruse our resources for webinars, case studies, infographics, and educational videos.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.