There is one thing that can be said of the cyber world- it doesn't really have heatwaves. While the world outside seems to be turning up the heat, the world of cybersecurity is trying to dial into the cold reality of privacy. The latest issues stem not only from recent court decisions, but from longstanding issues surrounding privacy and the right for a consumer to know who has access to what data, and why.
There are new federal requirements for reporting financial cybersecurity breaches, many of which are being implemented now after years of rising cyber breaches and chronic under-reporting. Will more stringent reporting make for more robust security? As far as privacy rules go, California's Consumer Privacy Act is coming up with some changes as well, many of which affect app developers in interesting ways. We can only hope that it helps out the medical device community as well, requiring a clear SBOM is just the tip of the med-tech-device-iceberg. Hold on, this privacy-laden newsletter is steering you towards the notion that cybersecurity, privacy, and the real world are all very much interconnected. Keeping one safer means looking at all three in tandem. Let's take a dive in together today.
- New Federal Reporting Requirements Demand Timely and Accurate Cyber-intelligence via CPO Magazine Cybercrime within the financial services sector is evolving at the speed of innovation, sometimes outpacing the progress of cybersecurity.?When the criminals are motivated, and the reporting is slim, how are we to know the real scope of the problem? New Federal Reserve and FDIC requirements for reporting cybersecurity incidents aims to keep investors secure in the knowledge that their transactions are covered.
- California Privacy Rules Target Dark Patterns Through Technology Design via CybersecurityDive There are big changes to California’s?Consumer Privacy Act?(CCPA) coming up due by the start of next year.? Close cooperation between legal and IT will be necessary, as some of the most important requirements in the?California Privacy Rights Act?(CPRA), which was enacted in 2020 to strengthen CCPA consumer protections, links compliance with website and app design. How will this affect your app design in the future, even if you're not California based? Let's dive in.
- Securing the Internet of Medical Things via HealthTech Magazine The “black box” nature of most connected gear in a healthcare setting has made securing IoMT devices against threats increasingly difficult. The basic requirement is isolation: separating each device as much as possible from others, which can become operationally impossible for larger hospitals or smaller IT teams. How can we address the issue? Check it out here.
- Authentication Weakness Responsible for 80% of Financial Breaches via SCMedia Despite the ongoing move to multi-factor authentication (MFA), the financial sector still faces a significant problem when it comes to breaches related to identification compromise. How can your organization move to MFA? Talk to the experts at Idenhaus- whether you want MFA, ZTA, or just to talk about your overall cybersecurity structure, Idenhaus is here to help.
- Identity Management and the Second Half of the Chessboard?via GRC Outlook Excellent data quality is a prerequisite for Identity Management and Governance and not the other way around. If the quality of your data is bad, your Identity Management, Governance, and Compliance initiatives will be almost worthless to pursue and automate. Change that with good data management.
- Attack Surface Management via Idenhaus Do you have 100% of your organization’s attack surface inventoried? While it may seem like a Sisyphus-level task to keep up with attack vectors today, the reality of the matter is that you have to keep up with them, or the threat actors will find a way into your best laid cybersecurity plans. Don't let it happen to you!?Talk to Idenhaus’ experts today!
By?going to work quickly to solve the most challenging?cybersecurity?and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age.?Click here to contact us.
Peruse our?resources?for?webinars,?case studies, infographics, and?educational videos. To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our?Identity Management biweekly?and/or our?Healthcare Cybersecurity and IAM Digest.
Follow?@Idenhaus?on Twitter and subscribe to our?YouTube channel.