Attack Surface Management

Attack Surface Management   Do you have 100% of your organization’s attack surface inventoried? No, seriously. Do you know every device that’s logging into your network, including who it is, and when? Have you checked every proverbial door, window… basement, attic, heck, every nook and cranny? I would argue: probably not. In today’s environment, especially […]

Happy Long Weekend, Healthcare Cybersecurity Workers!

As we come up to the holiday week, Idenhaus wants to remind everyone to be safe this holiday and all summer long. Cybersecurity starts at home, and good habits are learned from an early age. Some people started their cybersecurity journey needing only a few reminders about password health and links to look out for. […]

Data Quality Issues – How They Affect Security & Your Bottom Line

by Leah Livingston Last week, we brought to light some data quality issues that are affecting all aspects of the organization. You probably asked yourself, “Wait, our poor data quality is affecting our security posture, as well as our profit margin?” The short answer is, absolutely. Remember our examples? It’s not just slow onboarding or […]

Atlanta Business RadioX Interview with Idenhaus’ Hanno Ekdahl

The last two years have been tumultuous for many organizations, and we have seen an explosion in demand for cybersecurity and Identity and Access Management solutions to help them adapt. Organizations are more reliant now than ever before on their IT systems to keep up with their clients, partners, and employees. Because the demand was […]

Reasons to be Thankful for Cybersecurity, Part Two

In this edition of our newsletter, we’re highlighting the good that comes from cybersecurity, especially from the proactive approach of zero trust. We’re thankful for cybersecurity, both when it works and when it’s being worked on. Less thankful for the malware and threat actors out there, but with the right cyber security plan in place, […]

5 Must-Have Cyber Security Policies for your Organization

5 Must-Have Cyber Security Policies for your Organization, by Sajid Shafique One of the most essential factors in maintaining a good security posture for an organization is setting forth the expectation of what is allowed and what is not. Any action that the organization might take, ranging from implementing technical controls like setting up a […]

Reasons To Be Thankful for Cybersecurity, Part One

This week, we revisit the reasons behind phishing, and some of the newest phishing stories to break. Want to learn more about how to keep from being a victim? In a few words: vigilance, planning, and updates updates updates. Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view […]

November Reading for IAM Professionals

This week, we look at a comparison of cybersecurity to the popular show The Squid Games, talk about removing admin privileges (without teeing anyone off), and the new use for a Civil War era government Act that is going to start applying to cybersecurity. Join us for all this and more… Thanks for checking out […]

IAM Best Practices: Initial Population Of ID Stores

At the heart of it, Identity Management solutions are intended to help make identity management easier, not more difficult. However, when not properly implemented, solutions that are designed to help can really seem more like a hindrance. Let’s talk best practices for ID stores, a basic component of a good overall IAM solution. Why ID […]

October Articles for Identity and Access Management

This week, we take a dive into the psychology of hacking humans, and why that’s so profitable right now. We are watching the future of cybersecurity unfold both for government and businesses, and how that will affect the coming month and years. As always, we look to keep our readers safe and up to date […]