October Articles for Identity and Access Management

This week, we take a dive into the psychology of hacking humans, and why that’s so profitable right now. We are watching the future of cybersecurity unfold both for government and businesses, and how that will affect the coming month and years. As always, we look to keep our readers safe and up to date with the best ways to keep themselves that way. PSA: Don’t click anything you don’t trust. Ever. Come take a dive with Idenhaus, and find out what the security world has been up to this week.

Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8 PM ET.

Crisp, Freshly Seasoned Reading to Fill Your Fall

 

How Attackers Hack Humans via Dark Reading

Not all hacking relies on perfect code – much of it relies on unwary people. From SMS Phishing to new methods of ransomware deployment, much of it relies on the fallible human factor.

How Can States, Feds Collaborate Better on Cybersecurity? via GovTech Magazine

During the second week of the federal Annual National Cybersecurity Summit, experts shared their thoughts on the roles of states and federal agencies when it comes to dealing with cyber attacks within state borders.

How Financial Institutions Can Prepare for Advanced Cyberthreats in 2022 and Beyond via FinExtra

A new wave of embedded finance, Banking as a Service (BaaS) and other financial technology (FinTech) software is emerging to make online transactions easier for customers but widening the threat landscape – how can you prepare?

DOJ to Federal Contractors: Report Cyberattacks or Face the False Claims Act via National Law Review

The US DOJ’s Initiative aims to hold contractors and recipients to a higher standard by promising to aggressively enforce cybersecurity compliance—particularly reporting requirements—in federal contracts and grants by way of the False Claims Act’s civil fraud and whistleblower provisions.

4 Steps to Protect the C-suite from Business Email Compromise Attacks via CSO Online

Business email compromise (BEC) is one of the most common causes of security breaches. BEC is the fastest growing and most successful attack vector in the U.S. Small to medium-sized businesses are the most vulnerable due to lack of awareness and expertise. The ‘spray and pray’ approach is low cost, highly rewarding, and has a relatively low probability of the perpetrator getting caught. The hard truth is that humans are easier to hack than systems.

Security Questions: Boon or Bane? via Idenhaus

We’ve all done it- filled out a casual quiz on social media, or answered silly questions which, thinking about it, might be answers to those security questions they ask when you login… Let’s have a look at the reason behind security questions, and then ask ourselves: how can we remember all of this?

Check out our previous digest of articles for Identity Management Professionals, Crisp Reading for the Fall Season: IAM Article Roundup.

To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

Follow @Idenhaus on Twitter and subscribe to our YouTube channel.



By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

 

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top