How Not to Get Quished When Hungry!


How Not to Get Quished When Hungry! By Sandhya Sukumar Why QR Codes for Quishing? Quishing represents a sophisticated evolution of phishing, and its stealthy nature makes it a potent threat. QR codes offer a covert channel for attackers. They require shorter HTML source code to embed malicious links. Due to their unique approach, email filters, […]

Gartner 2023: The State of IAM Program Management 

Gartner 2023: The State of IAM Program Management  By Addy Agee The establishment and delivery of an IAM Program is vital to delivering Identity First security. Whether you are new to identity or delivering identity and access management currently, you need to understand and communicate the role that identity plays within your organization to enable […]

Idenhaus is a Best of Georgia Winner

Idenhaus is a Best of Georgia® Regional Winner   The votes have been counted and the results are in! Idenhaus is officially a 2022 Best of Georgia® Regional winner in Georgia Business Journal’s annual readers’ poll! We are humbled by this recognition, and look forward to many more years of local interactions to come. Georgia […]

How Do I Become CMMC Certified?

Last week, we learned what CMMC is, all the revisions you’ve been hearing about, and when all defense industrial case (DIB) contractors are required to be CMMC 2.0 compliant. By the way, it’s May 2023. Today, we’re going to walk through what controls and requirements are, and how to get CMMC 2.0 certified. Creating a […]

What is Cybersecurity Maturity Model Certification (CMMC)?

First: The Definition of a Maturity Model. Okay, before we jump into CMMC, it’s important to understand what a maturity model is… which is a tool to measure the ability of an organization to continuously improve in a particular discipline. Organizations use these frameworks as a baseline to gauge their current state in a specific […]

Protect Your Online Identity With These Expert Tips By Idenhaus Consulting

From an interview with Hanno Ekdahl and SafetyDetectives It’s beyond doubt that digital transformation has been a savior for many businesses in terms of cost-savings and improved efficiency, but going fully online comes also at a risk In fact, organizations embracing digital transformation must also understand the cybersecurity risks that come with it, like data […]

Cybersecurity in Healthcare: Why It Matters and How It Helps

Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you. As the Internet of Things (IoT) and the medical IoMT […]

FedRAMP: What Is It, and How Can It Benefit You?

In the past, we discussed NIST SP 800-171, but what about securing cloud-based products and services? Let’s dig deeper. Prior to FedRAMP, each agency had to establish its own security standards and dedicate specialized resources. This would make things more complicated and make security across agencies a nightmare. Many agencies lack the funding necessary to […]

New Federal Reporting Requirements, California’s Privacy Rules Trickling Down and More

Thanks, as always, for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8PM ET. New Federal Reporting Requirements Demand Timely and Accurate Cyber-intelligence via CPO […]