Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

8 Must-Read Healthcare Security Articles, February 2021

8 Must-Read Healthcare Security Articles, February 2021

Medical device cybersecurity, data breaches, and security threats headline this week’s digest of healthcare security articles. Thanks for checking out the biweekly digest of healthcare security articles.  Peruse our resources section for webinars, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET. …

8 Must-Read Healthcare Security Articles, February 2021 Read More »

Health Care Cyber Security Articles, January 2021

7 Insightful Health Care Cyber Security Articles, January 2021

PACS Cybersecurity Guidance, ransomware, and HIPAA legislation headline this week’s digest of health care cyber security articles. Thanks for checking out the biweekly digest of helpful health care cyber security articles.  Peruse our resources section for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity …

7 Insightful Health Care Cyber Security Articles, January 2021 Read More »

penetration testing

Penetration Testing: Everything You Need to Know

Each year, cyber-attacks are getting more complex. Organizations cannot afford to implement security tools without validating that they are properly performing. Ineffective controls and human error can expose the most sophisticated systems to breaches, which often go undetected for months or even years. The best way to be proactive against the threat of a cyber-attack …

Penetration Testing: Everything You Need to Know Read More »

IAM Roadmaps

5 Benefits of IAM Roadmaps

Learn how IAM Roadmaps ensure your Identity Management project is successful, the first time around. Technology is changing at an accelerating pace. Traditional approaches to strategic IT planning are no longer sufficient for organizations to be successful. Strategic plans determine the overall direction of a program and establish its principle goals; however, these plans rarely …

5 Benefits of IAM Roadmaps Read More »

zero trust

Leveraging Zero Trust with Identity at the Core

Learn how you can leverage the Zero Trust Model to better protect your organization. The Changing Business Landscape The Covid-19 pandemic has made working from home the new norm, which has made it clear that the traditional concept of a well-defined network perimeter can’t be relied upon anymore for cybersecurity. A perimeter-centric defense where everyone …

Leveraging Zero Trust with Identity at the Core Read More »

Policy Based Access Control (PBAC)

What is Policy Based Access Control (PBAC)?

Learn how Policy Based Access Control (PBAC) combines semantic security risk management with a dynamic policy framework to mitigate security threats.  Organizations rely on a wide range of applications and operating systems to securely deliver value to their customers efficiently and effectively. In addition to this complexity, businesses are also working across multiple environments (OnPrem …

What is Policy Based Access Control (PBAC)? Read More »

biometrics

An Introduction to Biometrics for Identity Management

In this article, we provide an overview of Biometrics and how they can be used to manage identity.  At the beginning of 2020, Cybersecurity pundits have already made their predictions about what the threat landscape will look like this year. While some have predicted gloom and doom scenarios, others believe that it will be the …

An Introduction to Biometrics for Identity Management Read More »

HR Rebellion

Mastering Identity Management: Is HR Creating a Hostile Work Environment?

Identity and Access Management (IAM) is a unique IT solution because of its far-reaching scope. IAM touches everyone and everything in an organization.  Its reach extends from HR processes to the physical and system access of each individual. Once IAM goes live, the entire employee lifecycle is driven by the HR team and how they …

Mastering Identity Management: Is HR Creating a Hostile Work Environment? Read More »

privacy and cybersecurity articles

9 Privacy and Cybersecurity Articles, March 2020

Thanks for checking out the Idenhaus Identity Management and Cybersecurity biweekly digest. Every 2 weeks, we curate a selection of IAM, Healthcare IT, Identity Governance, Privacy and Cybersecurity articles. Check out our resources section for webinars, case studies, infographics, and educational videos. To receive the top Identity Management, Privacy and Cybersecurity articles in your inbox …

9 Privacy and Cybersecurity Articles, March 2020 Read More »

healthcare iam roadmap

3 Key Considerations for Your Healthcare IAM Roadmap

Learn how a Healthcare IAM Roadmap can set your organization on the path to a successful Identity Management implementation. Dramatic changes are required in healthcare organizations to improve the quality of patient outcomes, increase access to care, protect privacy, and reduce costs in light of new healthcare technologies, including telemedicine and online resources supporting patient …

3 Key Considerations for Your Healthcare IAM Roadmap Read More »

Scroll to Top