Cybersecurity Strategy and Roadmaps: Creating a Secure Foundation for the Future

Cybersecurity Strategy and Roadmaps: Creating a Secure Foundation for the Future In today’s digital age, cybersecurity is critical to any business operation. It’s not a question of whether a company will face a cyber attack but when it will happen. Companies need to adopt a proactive approach towards cybersecurity to ensure that their assets are […]

How Not to Get Quished When Hungry!

How-not-to-get-quished-when-hungry

How Not to Get Quished When Hungry! By Sandhya Sukumar Why QR Codes for Quishing? Quishing represents a sophisticated evolution of phishing, and its stealthy nature makes it a potent threat. QR codes offer a covert channel for attackers. They require shorter HTML source code to embed malicious links. Due to their unique approach, email filters, […]

Gartner 2023: The State of IAM Program Management 

Gartner 2023: The State of IAM Program Management  By Addy Agee The establishment and delivery of an IAM Program is vital to delivering Identity First security. Whether you are new to identity or delivering identity and access management currently, you need to understand and communicate the role that identity plays within your organization to enable […]

Idenhaus is a Best of Georgia Winner

Idenhaus is a Best of Georgia® Regional Winner   The votes have been counted and the results are in! Idenhaus is officially a 2022 Best of Georgia® Regional winner in Georgia Business Journal’s annual readers’ poll! We are humbled by this recognition, and look forward to many more years of local interactions to come. Georgia […]

How Do I Become CMMC Certified?

Last week, we learned what CMMC is, all the revisions you’ve been hearing about, and when all defense industrial case (DIB) contractors are required to be CMMC 2.0 compliant. By the way, it’s May 2023. Today, we’re going to walk through what controls and requirements are, and how to get CMMC 2.0 certified. Creating a […]

What is Cybersecurity Maturity Model Certification (CMMC)?

First: The Definition of a Maturity Model. Okay, before we jump into CMMC, it’s important to understand what a maturity model is… which is a tool to measure the ability of an organization to continuously improve in a particular discipline. Organizations use these frameworks as a baseline to gauge their current state in a specific […]

Protect Your Online Identity With These Expert Tips By Idenhaus Consulting

From an interview with Hanno Ekdahl and SafetyDetectives It’s beyond doubt that digital transformation has been a savior for many businesses in terms of cost-savings and improved efficiency, but going fully online comes also at a risk In fact, organizations embracing digital transformation must also understand the cybersecurity risks that come with it, like data […]

Cybersecurity in Healthcare: Why It Matters and How It Helps

Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you. As the Internet of Things (IoT) and the medical IoMT […]

FedRAMP: What Is It, and How Can It Benefit You?

In the past, we discussed NIST SP 800-171, but what about securing cloud-based products and services? Let’s dig deeper. Prior to FedRAMP, each agency had to establish its own security standards and dedicate specialized resources. This would make things more complicated and make security across agencies a nightmare. Many agencies lack the funding necessary to […]