Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

IdM and Cybersecurity Articles, January 2021

10 Must-Read IdM and Cybersecurity Articles, January 2021

Risk, supply chain hacks, and Identity Management strategy headline this week’s digest of IdM and Cybersecurity Articles. Thanks for checking out this week’s digest of IdM and Cybersecurity articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays […]

10 Must-Read IdM and Cybersecurity Articles, January 2021 Read More »

healthcare infosec articles

10 Must-Read Healthcare Infosec Articles, January 2021

Ransomware, HIPAA Legislation, and cyberattacks headline this week’s digest of healthcare infosec articles. Thanks for checking out the biweekly digest of healthcare infosec articles.  Peruse our resources section for webinars, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET. 10 Must-Read Healthcare

10 Must-Read Healthcare Infosec Articles, January 2021 Read More »

identity management strategy

What is an Identity Management Strategy?

IAM is more than technology implementation. That’s why you need an Identity Management strategy. On its face, Identity Management (IAM)  appears to be a straightforward exercise. It’s about validating a user’s identity and determining which user should have access to what. Simple, we’ll buy a product, install it, put in a few connectors, and there

What is an Identity Management Strategy? Read More »

9 Identity Management and Cybersecurity Articles, January 2021

9 Identity Management and Cybersecurity Articles, January 2021

Privacy law, IoT devices, and IAM resources headline this week’s digest of Identity Management and Cybersecurity Articles. Thanks for checking out this week’s digest of Identity Management and Cybersecurity articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered

9 Identity Management and Cybersecurity Articles, January 2021 Read More »

Health Care Cyber Security Articles, January 2021

7 Insightful Health Care Cyber Security Articles, January 2021

PACS Cybersecurity Guidance, ransomware, and HIPAA legislation headline this week’s digest of health care cyber security articles. Thanks for checking out the biweekly digest of helpful health care cyber security articles.  Peruse our resources section for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity

7 Insightful Health Care Cyber Security Articles, January 2021 Read More »

identity management resources

Top 10 Identity Management Resources and Articles from 2020

Let’s take a look at our most popular Identity Management resources and articles from 2020, in no particular order. Wow, 2020 was quite the year. Cybercrime skyrocketed 600% due to the Covid-19 pandemic and health systems become an even more popular target for hackers. Ransomware attacks doubled in Q3 of 2020 and we saw the

Top 10 Identity Management Resources and Articles from 2020 Read More »

Identity Governance and Cybersecurity Articles

7 Insightful Identity Governance and Cybersecurity Articles

IAM trends, IoT privacy, and PBAC headline this week’s digest of Identity Governance and Cybersecurity Articles. Thanks for checking out this week’s digest of Identity Governance and Cybersecurity articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays

7 Insightful Identity Governance and Cybersecurity Articles Read More »

healthcare security

7 Healthcare Security Articles, December 2020

Privacy, telehealth, and AI headline this week’s digest of Healthcare Security articles. Thanks for checking out the biweekly digest of helpful healthcare security articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare. Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe

7 Healthcare Security Articles, December 2020 Read More »

penetration testing

Penetration Testing: Everything You Need to Know

Each year, cyber-attacks are getting more complex. Organizations cannot afford to implement security tools without validating that they are properly performing. Ineffective controls and human error can expose the most sophisticated systems to breaches, which often go undetected for months or even years. The best way to be proactive against the threat of a cyber-attack

Penetration Testing: Everything You Need to Know Read More »

16 Informative Identity Management Articles, December 2020

16 Informative Identity Management Articles, December 2020

Identity Governance, IAM Acronyms, and Biometrics headline this week’s digest of IGA and cybersecurity articles. Thanks for checking out this week’s digest of IGA and cybersecurity articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8

16 Informative Identity Management Articles, December 2020 Read More »

Scroll to Top

Add Your Heading Text Here