Fresh For Summer: Articles for Healthcare IAM Professionals

Fresh Summer Articles for Healthcare IAM Professionals

The summer continues with more cyber attacks, cyber insurance premiums rising, and the medical device sector is feeling the crush in this week’s digest of articles for Healthcare IAM professionals. Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would […]

9 Top Articles on Cybersecurity & Identity Management

Top Stories on Digital Identity Management, ICS Attacks, and the Dangerous Data Your Smartphone Leaks. Every two weeks we release a curated digest of the most interesting and informative articles covering IAM, Cybersecurity, Governance, ICS/SCADA, compliance, privacy, and more across a range of industries. If you would prefer to receive this via email (and a […]

The Secret of Successful Vulnerability Management Programs

In the complex world of cybersecurity, a formal vulnerability management program is increasingly used to identify, communicate, and remediate key vulnerabilities across a wide range of facilities from office complexes to manufacturing plants. Vulnerability management is an old concept with a lot of understanding in a high-level capacity, but the execution of a full program […]

14 Must-Read IDAM and Cybersecurity Articles, October 2016

Every two weeks we release a curated digest of the most interesting, time-sensitive, and informative articles covering IAM, Cybersecurity, ICS/SCADA, Infosec, compliance and privacy topics across a range of industries. Due to the popularity of our biweekly newsletter, we have expanded the digest on our blog to include a broader selection of articles to provide […]

2 Critical Considerations for Integrating OT/IT Integration

OT/IT Integration success can be attributed to three key elements: people, process, and technology. The integration of OT and IT environments is a challenging project for any organization. To help bring simplicity to this complex undertaking, an OT/IT integration can be analyzed through the lens of the cybersecurity triangle – people, process, and technology. These […]

3 Essential Elements for IT/OT Integration Success

IT/OT Integration success can be attributed to three key elements: people, process, and technology. According to the U.S. Department of Homeland Security, operational technology (OT) operators were the most targeted sector of industrial cyber-attacks in 2015, making IT and OT integration more important than ever for industrial businesses. The introduction of networks into the industrial space […]

Top 10 Identity Management & Cybersecurity Articles, August 2016

Every two weeks we curate the top Identity Management and Cybersecurity articles from around the industry. Today’s digest covers topics from OT/IT collaboration to DDoS and ransomware to biometrics and digital identity. Check out these 10 must-read IAM and cybersecurity articles from early August 2016. If you would prefer to receive an even shorter digest, please subscribe […]

Overcoming Operational Technology (OT) and IT Integration Challenges

In a recent vulnerability test, RedTeam Security was able to penetrate a US power grid – both online and offline – within a three day window. A quick Google search of cybersecurity and the energy sector will return thousands of results discussing how the industrial control system (ICS) security environment is in dire straights. Many […]