Top 7 Cybersecurity and IAM Articles from May 2016

June 1, 2016

The top, must-read Cyber Security and Identity Management articles from May 2016 include new SCADA vulnerabilities, SWIFT under fire, global cybersecurity risks, IT security best practices, and more.

Get this biweekly update delivered a day earlier by signing up for our newsletter.


US ICS-CERT Urges Admins to Mitigate New SCADA Risk

The US Department of Homeland Security has issued an alert urging IT administrators in the energy sector to take steps to mitigate two serious vulnerabilities in SCADA products. Read more >>


Will your backups protect you against ransomware?

The headlines are full of reports about institutions such as hospitals and police departments, organizations that should have business continuity plans in place with solid backup strategies. Read more >>


Crisis of the Week: Swift Under Fire After Bank Cyberattacks

SWIFT is under scrutiny following a series of cyberattacks that led to series of thefts of tens of millions of dollars from banks in Bangladesh, Vietnam and Ecuador. Criminals used the banks’ Swift access codes to submit fraudulent fund-transfer requests. Read more >>


SEC: Cyber security is the biggest risk to the global financial system

Cyber security is the biggest risk facing the financial system, the chair of the SEC said on Tuesday, in one of the frankest assessments yet of the threat to Wall Street from digital attacks. Read more >>


Where Are We Now?: The SANS 2016 ICS Survey [Webcast]

This new webcast presents the results of the 2016 survey and explores how the state of security for industrial control systems has changed over the past 12 months as well as looks at emerging threats. Read more >>


Austrian Firm Fires CEO After $56-million Cyber Scam

Austrian aircraft parts maker FACC said Wednesday that it has fired its chief executive of 17 years after cyber criminals stole some 50 million euros in a so-called "fake president" scam. Read more >>


Effective IT security habits of highly secure companies

The following is a collection of common practices and strategies of the most highly secure companies I have had the opportunity to work with over the years. Consider it the secret sauce of keeping your company's crown jewels secure. Read more >>



If you enjoyed these articles, signup below to get the Idenhaus Identity Management & Cybersecurity News delivered to your inbox.

Sign up to get your News delivered:

* indicates required



Photo Credit: Flickr

More News