10 Must-Read IdM and Cybersecurity Articles, January 2021

January 28, 2021
IdM and Cybersecurity Articles, January 2021

Risk, supply chain hacks, and Identity Management strategy headline this week's digest of IdM and Cybersecurity Articles.

IdM and Cybersecurity Articles, January 2021

Thanks for checking out this week's digest of IdM and Cybersecurity articles. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videosSubscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.

10 IdM and Cybersecurity Articles, January 2021


What is an Identity Management Strategy? via Idenhaus

IAM is one of those solutions that sounds easy but is actually really difficult to get right. Statistically, more than half of IAM projects fail the first time, and even those that “succeed” usually fall short of expectations.


Understanding third-party hacks in the aftermath of the SolarWinds breach via HelpNetSecurity

If you were using a version that was hacked, you should certainly report on what you did to investigate whether or not there was further compromise, how closely you were able follow CISA recommendations, what were the results of the investigation, what you did to contain the affected systems, and whether or not (in consultation with your legal department) you suffered a breach as a result – but you should definitely do not stop there.


Compliance should view cyber-security through prism of risk via ComplianceWeek

What’s most important for compliance officers is to understand the risks that breaches and hacks pose to their organizations, not the technical manner of how those breaches occur. Expertise in the technical aspects of cyber-security is not required to understand those risks.


4 ways security has failed to become a boardroom issue via CSO Online

Twenty-eight percent of respondents believe cybersecurity is entirely a technology area, while 41% say that cybersecurity is mostly a technology area with some emphasis on the business aspects of cybersecurity. Alarmingly, 11% still think of cybersecurity as a regulatory compliance area alone.


WhatsApp loses millions of users after terms update via The Guardian

Poorly-executed change to terms of service sends messaging app’s subscribers flocking to competitors


How to Create a Bulletproof IoT Network to Shield Your Connected Devices via IoT for All

Today, IoT and connected devices are becoming prime targets for hackers everywhere. And while there’s no magic bullet to secure them all against every possible attack, it’s not that hard to create a purpose-built network for your IoT devices to keep them as safe as possible.


Industry Experts Offer Cybersecurity Advice for a COVID World via FinTech Times

The coronavirus crisis has exposed many areas in business that had been neglected prior to the pandemic. And IT is no exception.


Ransomware Gangs Scavenge for Sensitive Data by Targeting Top Executives via TripWire

In their attempt to extort as much money as quickly as possible out of companies, ransomware gangs know some effective techniques to get the full attention of a firm’s management team.


The perfect theft: the increase in card-not-present fraud via ATM Marketplace

With so much sensitive data readily available on the black market and given the difficulty merchants face when attempting to validate a consumer's identity online, digital CNP transactions provide fraudsters with the perfect opportunity for theft.


How a Solution Roadmap Aligns IT and Business Strategy via Idenhaus

The simplest and most effective way to link your business strategy with your IAM program is to build a solution roadmap, which lays out your plan for the next 1 to 2 years. The process to create a roadmap requires input from both technical and business stakeholders and makes the implicit explicit.

Check out our previous digest of IdM and Cybersecurity articles, 9 Identity Management and Cybersecurity Articles, January 2021



To receive the top IdM and Cybersecurity articles in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.


Follow @Idenhaus on Twitter and subscribe to our YouTube channel


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

More News