Idenhaus Biweekly: 8 Must-Read Identity & Cybersecurity Articles

Idenhaus Biweekly_ 8 Must-Read Identity & Cybersecurity Articles

Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos.

Subscribe to the Idenhaus biweekly newsletter here.

 

Role Based Access Control (RBAC) and Systems Thinking via Idenhaus

As organizations mature in scale and complexity, so too does managing the complexity of user access and the corresponding risk governance issues. With this in mind, Role Based Access Control (RBAC) provides a framework to help manage user access in the context of a rapidly changing and more complex risk profile.

 

How well are healthcare organizations protecting patient information? via HelpNet Security

The balance between optimizing the user experience and protecting the data must be achieved in an effective cybersecurity strategy: HCOs need to make it easy for patients and partners to access records while ensuring adequate data protection.

 

Hackers Favor Weekdays for Attacks, Share Resources Often via ThreatPost

When researchers looked at the web-filtering volume from two Cyber Kill Chain phases, comparing weekdays and weekends, they discovered that pre-compromise activity is roughly three times more likely to occur during the work week.

 

Identity Management Sparks Friction Between Executives, Employees via WSJ

Hackers often attack company networks using compromised login information. Experts say the solution is secure yet flexible identity-management tools and practices — but figuring out what is best isn’t easy.

 

92% of SMBs Struggle With Identity Challenges via Solutions Review

Recently, password manager LastPass unveiled their latest study: SMBs Guide to Modern Identity. Among their critical finds, 92% of small-to-medium-sized businesses (SMBs) deal with identity challenges in their environments. 47% cite ease of use as their biggest challenge.

 

Planning a cloud migration? Get your identity privileges in check first via BetaNews

Enterprises are generally aware of the problem and want to fix it, but they rarely know where to start or what to do. A big pain point is that they don’t have the level of visibility required to understand what actions identities are authorized to perform on critical resources across multiple, complex and vastly different cloud operating models. As such, cloud migrations are an ideal time to prioritize identity privilege management.

 

Mercedes Thieves Showed Just How Vulnerable Car-Sharing Can Be via Bloomberg

 After Car2Go eased its background checks, 75 of its vehicles were stolen in one day. The mass theft in Chicago illustrates a persistent challenge for car-sharing companies looking to draw in members with access to expensive makes and models.

 

Why IDM is the Secret to Creating the Onboarding of the Future  via Idenhaus

Automation is the key to making the onboarding process—a critical business process—work for your organization. But how do you decide what parts of the process are worth the effort to automate?

 

 

Check out our previous digest of insightful Identity Governance and access management articles here: Idenhaus Biweekly: RBAC, Healthcare Cybersecurity, Identity Management

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter.

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top