New Federal Reporting Requirements, California’s Privacy Rules Trickling Down and More

Thanks, as always, for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8PM ET. New Federal Reporting Requirements Demand Timely and Accurate Cyber-intelligence via CPO […]

Attack Surface Management

Attack Surface Management   Do you have 100% of your organization’s attack surface inventoried? No, seriously. Do you know every device that’s logging into your network, including who it is, and when? Have you checked every proverbial door, window… basement, attic, heck, every nook and cranny? I would argue: probably not. In today’s environment, especially […]

Identity Management and the Second Half of the Chessboard

by Hanno Ekdahl Ray Kurzweil coined the phrase “second half of the chessboard” when describing the point where an exponentially growing factor begins to have a significant economic impact on an organization’s overall business strategy, in particular with regard to technology. Small issues in data quality, solution design, and processes become a force multiplier at […]

Wishing All Our Cybersecurity People A Happy Holiday Week

With big holidays come the big threats- whether that threat is on a personal scale, or an enterprise scale is the question. While most people know that they need to keep a wary eye out for extra scams at holidays, others are distracted, overworked or over-stressed, and they might need a refresher. Let’s all look […]

Happy Long Weekend, Healthcare Cybersecurity Workers!

As we come up to the holiday week, Idenhaus wants to remind everyone to be safe this holiday and all summer long. Cybersecurity starts at home, and good habits are learned from an early age. Some people started their cybersecurity journey needing only a few reminders about password health and links to look out for. […]

Legacy Systems and Ransomware: A Healthcare Story

While it can still feel much like the wild, wild west in the fringes of the internet, and in some aspects of healthcare, the reality is that much of the best new medical technology we are seeing has been developed using the current software available. Now, as that tech ages, it can be much easier […]

Staggering Up Legacy OS Hill, Staying Ahead Of Hackers With AI & IAM and More

Sometimes, it can feel like your organization is stuck in a cybersecurity rut. Other times, your organization is actually stuck, but not in any rut- just in the legacy systems that continue to work enough to not need replacing. Legacy systems are creating plenty of extra issues for those who have to keep using them […]

Policy vs Standards vs Procedures

How can we ensure that employees and individuals inside any business use technology in the manner that the organization expects? Previously, we discussed Why Every Organization Needs Information Security Policies. Any business will take steps to secure its information assets; and how that business will do so should be documented and described in their information […]

Honoring Those Who Served: Happy Memorial Day from Idenhaus

Idenhaus highlighted some healthcare heroes for Nurses’ week in May, and now we want to highlight how thankful we are to all those who have served in the military, no matter how they served. For all those still serving, we thank you as well. In this edition of the newsletter, we dig into the topics […]