Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

The Good, The Bad, The Agile

The Good, The Bad, and The Agile Agile methodologies have become increasingly popular as businesses have sought to develop software more quickly and efficiently. Agile methods are based on iterative development, where software is developed in small increments and delivered on shorter timeframes. These development cycles, called Sprints, allow greater flexibility and responsiveness to changing […]

The Good, The Bad, The Agile Read More »

Unprepared and Vulnerable: Understanding Disaster Recovery Planning, Risks, DRaaS, and the Benefits of In-House Solutions

Unprepared and Vulnerable: Understanding Disaster Recovery Planning, Risks, DRaaS, and the Benefits of In-House Solutions   By Sandhya Sukumar    Along with the risks of natural disasters, human errors, hardware, and infrastructure failures, one can consider “cyberattacks” as one of the top risks that an organization must prepare for.  Hence, Disaster Recovery planning is essential

Unprepared and Vulnerable: Understanding Disaster Recovery Planning, Risks, DRaaS, and the Benefits of In-House Solutions Read More »

Building a Culture of Cybersecurity with Strategies for Training and Awareness

Building a Culture of Cybersecurity: Strategies for Training and Awareness Written by TJ Rubeck In today’s rapidly evolving threat landscape, employees are often considered the weakest link in cybersecurity. Attackers often target human vulnerabilities through social engineering attacks, phishing, or other related threats. The increasing frequency and sophistication of cyber attacks have made one thing

Building a Culture of Cybersecurity with Strategies for Training and Awareness Read More »

Are You Maximizing Your IAM Investment? 

By Sandhya Sukumar  In this era of evolving cyber threats, strengthening the IAM space is the top security goal for every organization. When IT leaders contemplate IAM solutions, their primary concern is alignment – ensuring that the IAM strategy not only addresses current cyber threats but also seamlessly aligns with compliance goals, budget constraints, and

Are You Maximizing Your IAM Investment?  Read More »

Building Cyber Resilience: Part II

By Sandhya Sukumar  In the first article on this topic we discussed the why, the what, and the importance of Cyber Resilience, including its challenges. In this article, let’s take a look at some of the components involved when building a Cyber Resilience strategy:  A holistic cyber resilience strategy encompasses cybersecurity measures across all levels

Building Cyber Resilience: Part II Read More »

Building Cyber Resilience

By Sandhya Sukumar  Organization leaders worldwide are increasingly aware that one single cybersecurity solution does not exist to tackle today’s sophisticated and rapidly evolving cybercrimes. Even with strengthened defenses, threat actors can find weaknesses and vulnerabilities to infiltrate a company’s network and IT Infrastructure. Moreover, modern IT infrastructures are complex, interconnected ecosystems involving multiple organizations

Building Cyber Resilience Read More »

What’s the Big Idea: Identity Management Projects that Deliver

What’s the Big Idea: Identity Management Projects that Deliver   By Hanno Ekdahl In the intricate tapestry of modern business, Identity Management (IDM) emerges as a critical thread, weaving together security, efficiency, and user experience. Identity management projects are not mere technical endeavors; they are strategic initiatives that demand a harmonious blend of design, technology, and

What’s the Big Idea: Identity Management Projects that Deliver Read More »

Hidden Dangers: Why Your Organization’s Cybersecurity Posture is Delusional

In today’s digital world, organizations rely on technology to conduct their operations efficiently. However, this rapid digital transformation has also opened up new avenues for cyber threats. While many organizations invest in cybersecurity measures, there is a pervasive overconfidence about the maturity of their actual cybersecurity posture. In this blog, we will shed light on

Hidden Dangers: Why Your Organization’s Cybersecurity Posture is Delusional Read More »

Five Cybersecurity Quick Wins

Five Cybersecurity Quick Wins   Cybersecurity is now a primary responsibility for companies of all kinds as the world embraces digital transformation. A data breach can have catastrophic financial and reputational consequences. With this in mind, it is crucial to take proactive measures to protect your organization’s assets. These five fast wins below can significantly

Five Cybersecurity Quick Wins Read More »

Scroll to Top