Staggering Up Legacy OS Hill, Staying Ahead Of Hackers With AI & IAM and More

Sometimes, it can feel like your organization is stuck in a cybersecurity rut. Other times, your organization is actually stuck, but not in any rut- just in the legacy systems that continue to work enough to not need replacing. Legacy systems are creating plenty of extra issues for those who have to keep using them […]

Data Quality Issues – How They Affect Security & Your Bottom Line

by Leah Livingston Last week, we brought to light some data quality issues that are affecting all aspects of the organization. You probably asked yourself, “Wait, our poor data quality is affecting our security posture, as well as our profit margin?” The short answer is, absolutely. Remember our examples? It’s not just slow onboarding or […]

Why Every Organization Needs Information Security Policies

Information Securities Policies

According to a study conducted by the University of Maryland, hackers are attacking computers connected to the Internet every 39 seconds, with online computers attacked on average 2,244 times a day. As the Worldwide Information Security Market is forecast to reach 170.4 billion in 2022 (Gartner), it is now not a question of “If” an […]

Fresh Articles for Identity and Access Management Professionals

The SEC and the Senate are working to regulate cyber activity, more attacks on major infrastructure, and how everyone can prepare for the next big technologies.  All that and more in this week’s digest of articles for Identity Management Professionals. Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here […]

Biweekly Curated Articles for Healthcare IAM Professionals

What better way to stay fresh this summer than a round of Idenhaus cybersecurity updates? We explore another of the common pre-breach mistakes organizations make, the shift to 5G, and proactive cybersecurity in the healthcare sector for this week’s digest of articles for Healthcare IAM professionals. Thank you for checking out our biweekly digest of […]

Early Summer IAM Article Roundup

The DOJ strikes back at the Colonial Pipeline hackers, the troubles with cyber insurance and the new Google Docs Phishing schema. All that and more in this week’s digest of articles for Identity Management Professionals. Thanks for checking out this week’s digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest. Peruse […]

Fresh For Summer: Articles for Healthcare IAM Professionals

Fresh Summer Articles for Healthcare IAM Professionals

The summer continues with more cyber attacks, cyber insurance premiums rising, and the medical device sector is feeling the crush in this week’s digest of articles for Healthcare IAM professionals. Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would […]

How To Leverage Identity in An Attack

How To Leverage Identity in An Attack

Identity Access Management (IAM) has evolved from an IT efficiency play into a foundational component of enterprise security frameworks everywhere. IAM centrally manages user accounts, credentials, roles, policies, attestation/certification, and audit/reporting for all of the organization’s users and resources. Today, IAM is an essential capability that supports both security and compliance mandates; however, organizations with […]

5 Final Thoughts on Gartner IAM 2019

gartner iam 2019

2019 was another record-breaking year, but these records are not the type we’ll be celebrating. Data breaches in 2019 were the worst in history. According to a report by New Risk Based Security, by November 2019 there was already a 33% increase in data breaches and exposed records compared to 2018. With this in mind, […]

Systems Thinking and Organization Modus Operandi

systems thinking

Stop optimizing the parts instead of the whole. Learn how to apply Systems Thinking to your Identity Management strategy.   As organizations grow, they eventually cross a threshold where they can no longer afford to manually administer and manage user access; at this point, they must find a way to automate routine user administration tasks. […]