9 Identity Management & Cybersecurity Articles for IT Pros

August 23, 2016

Security weaknesses in the US critical infrastructure, POS and supply chain systems, and biometric facial recognition headline the Idenhaus Identity Management and Cybersecurity digest for August 23, 2016.

If you would prefer to receive a short digest, please subscribe to the Idenhaus Identity Management & Cybersecurity biweekly here.

Here are the top 9 Identity Management and Cybersecurity articles worth checking out.

ICS-CERT report finds more than 600 IT security weaknesses in US critical infrastructure

The trend for connecting critical infrastructure to the internet has led to more than 600 IT security weaknesses being found in industrial control systems (ICS) in critical infrastructure in the US.


An iPhone feature has exposed a biometrics security flaw

Fraudsters may be able to get past one of these methods — facial recognition — by using the Live Photo functionality on the iPhone 6S, according to researcher Meaghan Johnson from fintech consultancy 11:FS. Johnson was able to gain access to accounts from two unnamed banks using facial recognition technology by presenting the facial recognition screen with a Live Photo. Read more >>


Oracle Micros breach highlights PoS and supply chain security risks

Oracle Micros breach shows supply chain and point of sale systems continue to be popular avenues of attack for cyber criminals. According to security blogger Brian Krebs, who was the first to report the breach, it appears that the Carbanak cyber criminal gang managed to breach around 700 computer systems at Oracle.


8 tips for keeping your data safe with Identity and Access Management

If you don’t take the necessary precautions to keep your credentials secure, your accounts and data are at risk of being compromised. With these tips for good password hygiene and deploying an identity and access management (IAM) solution, you can keep your data safe from the rapidly evolving threat landscape.


What IT Pros Need To Know About Hiring Cyber-Security Hunt Teams

If your organization doesn't run its own threat analysis center, it may be worth hiring a hunt team to watch your back. Here's what you need to know.


Is Open Source Software More Secure than Proprietary Products?

A popular argument of the pro-open source crowd is this: If it's open, it's essentially up for peer review, which means there are more sets of eyes to identify security holes and fix them. In a closed environment, how do you know how thorough your software's being reviewed if you can't see what's happening or know who's doing it?


10 IoT Security Best Practices For IT Pros

IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them.


The 3 Biggest Mistakes In Cybersecurity

The truth is that those that keep losing their cyber battles and risk losing the war are making three critical mistakes: They think cyber security is a technology problem; They follow a cyber security check list once-and-done; They don’t have a cyber security awareness training program in place.


CIOs, CISOs share advice on selling cybersecurity to the C-suite

Speak their language. Don’t talk too deeply about technology. But also remember to pitch the innovative ways that investing in security can improve the business, executives from Henry Ford, NIST, PwC, Texas Children’s and others advise.



If you enjoyed these articles, signup below to get the Idenhaus Identity Management & Cybersecurity News delivered to your inbox.

Sign up to get your News delivered:

* indicates required



Photo Credit: Flickr

More News