What’s the Big Idea: Identity Management Projects that Deliver

What’s the Big Idea: Identity Management Projects that Deliver   By Hanno Ekdahl In the intricate tapestry of modern business, Identity Management (IDM) emerges as a critical thread, weaving together security, efficiency, and user experience. Identity management projects are not mere technical endeavors; they are strategic initiatives that demand a harmonious blend of design, technology, and […]

What is ChatGPT?

What is ChatGPT? Written by Chat GPT, Leah Livingston, and Ashley Nicholson At Idenhaus, we like to stay well informed on new and emerging technologies. That said, a new AI technology that has recently emerged has us impressed – and a bit cautious as well. While the amazing things that can be done with AI are […]

Distributed Cyber Attacks: What SMBs Need to Know

distributed cyber attacks

A distributed cyber attack occurs when a hacker tries to disrupt services and make key resources unavailable, such as a website or online application. An attack can have a single point of origin (also called Denial of Service, or DOS) or it can be perpetrated by a group of hackers (Distributed Denial of Service, or […]

How Do You Define Cybersecurity Success?

Security, regardless of type, has always been about preparing for the worst. It is a negative goal, where we work to prevent access to a file, system, or network by unauthorized actors.  The challenge is that we have to think of all the ways that a bad actor might gain access, including understanding vulnerabilities in the […]

How to Measure the Effectiveness of Your Cybersecurity Program

Scoring a baseball game is a tradition that goes back to the sport’s early days. For fans, it is a great way to get more involved, stay engaged during the game, and understand each game’s story. In the end, every ballgame provides meaningful statistics that make it easy to know how well a team and […]

4 Fundamental Steps to Cybersecurity Planning Success

“If you fail to plan, you are planning to fail!” – Benjamin Franklin Planning for cybersecurity success may be the biggest obstacle for any organization to overcome. Why? Because planning is usually treated as a ‘bolt-on’ measure and not given the attention it deserves. Done correctly, a plan serves as a framework to define the […]

8 Insightful Articles on Access Management, Privacy, & Cybersecurity, December 2016

Cybersecurity Maturity Assessment, Privileged Access Management, and the Role of Cybersecurity in Mergers and Acquisitions Every two weeks we release a curated digest of the most interesting and informative articles covering IAM, Cybersecurity, Governance, ICS/SCADA, compliance, privacy, and more across a range of industries. If you would prefer to receive this via email (and a […]

The One Cybersecurity Assessment Every Organization Needs

Do a quick google search of cybersecurity assessments and you’ll find dozens of results that range from online surveys to downloadable diagnostics. Because cybersecurity assessment is a broad term and can account for a multitude of activities, for the purpose of this article, we are defining a cybersecurity assessment as an evaluation of your cybersecurity program. […]