Gartner 2023: The State of IAM Program Management 

Gartner 2023: The State of IAM Program Management  By Addy Agee The establishment and delivery of an IAM Program is vital to delivering Identity First security. Whether you are new to identity or delivering identity and access management currently, you need to understand and communicate the role that identity plays within your organization to enable […]

Identity First Security

By Leah Livingston Idenhaus attended last Monday’s Gartner session titled, “Identity-First Security as the North Star for Your IAM Reimplementation” led by Mary Ruddy. She focused on a key area that’s gaining attention: Identity-First Security. As the ecosystem evolves once again, Enterprises large and small are making the necessary shifts. The best part? Identity tools […]

AI to the Rescue for Identity Governance Access Certifications 

AI to the Rescue for Identity Governance Access Certifications … not so fast! Written by Ron Bowron In today’s digital world, businesses face numerous cybersecurity threats, making it essential to ensure that only authorized personnel can access sensitive data. Identity and Governance Access Certification Campaigns are an effective way to certify and review user access […]

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century By Leah Livingston By now, if you haven’t heard of OpenAI’s ChatGPT, then check out the blog that ChaptGPT wrote with us which provides a very clear definition. The chatter across industry circles has burned like wildfire on social media, podcasts, and chat forums; […]

What is ChatGPT?

What is ChatGPT? Written by Chat GPT, Leah Livingston, and Ashley Nicholson At Idenhaus, we like to stay well informed on new and emerging technologies. That said, a new AI technology that has recently emerged has us impressed – and a bit cautious as well. While the amazing things that can be done with AI are […]

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans

What’s the Magic Number? The Optimal Frequency of Penetration Tests & Vulnerability Scans   This is the million dollar question of security professionals year after year: How often should one perform Pen Tests and Vuln Scans for their organization? While there is no right or wrong answer, and each organization has its own unique security […]

How Do I Become CMMC Certified?

Last week, we learned what CMMC is, all the revisions you’ve been hearing about, and when all defense industrial case (DIB) contractors are required to be CMMC 2.0 compliant. By the way, it’s May 2023. Today, we’re going to walk through what controls and requirements are, and how to get CMMC 2.0 certified. Creating a […]

What is Cybersecurity Maturity Model Certification (CMMC)?

First: The Definition of a Maturity Model. Okay, before we jump into CMMC, it’s important to understand what a maturity model is… which is a tool to measure the ability of an organization to continuously improve in a particular discipline. Organizations use these frameworks as a baseline to gauge their current state in a specific […]