Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

5 Health Care Cyber Security Articles, December 2020

5 Health Care Cyber Security Articles, December 2020

Ransomware, digital transformation, and data control headline this week’s digest of health care cyber security articles. Thanks for checking out the biweekly digest of helpful health care cyber security articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare. Peruse our resources for webinars, case studies, infographics, […]

5 Health Care Cyber Security Articles, December 2020 Read More »

IGA and Cybersecurity articles

11 Must-Read IGA and Cybersecurity Articles

New NIST Companion Guide, IAM Roadmaps, and IoT headline this week’s digest of IGA and cybersecurity articles. Thanks for checking out this week’s digest of IGA and cybersecurity articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays

11 Must-Read IGA and Cybersecurity Articles Read More »

healthcare cyber security articles

7 Must-Read Healthcare Cyber Security Articles

MedTech, IAM Roadmaps, and Cyber Risk headline this week’s digest of healthcare cyber security articles. Thanks for checking out the biweekly digest of helpful healthcare cyber security articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare. Peruse our resources for webinars, case studies, infographics, and educational

7 Must-Read Healthcare Cyber Security Articles Read More »

IAM Roadmaps

5 Benefits of IAM Roadmaps

Learn how IAM Roadmaps ensure your Identity Management project is successful, the first time around. Technology is changing at an accelerating pace. Traditional approaches to strategic IT planning are no longer sufficient for organizations to be successful. Strategic plans determine the overall direction of a program and establish its principle goals; however, these plans rarely

5 Benefits of IAM Roadmaps Read More »

cyber security articles

9 Must-Read Cyber Security Articles, November 2020

Zero Trust, cyber skills shortage, and quantum computing headline this week’s digest of cyber security articles. Thanks for checking out this week’s digest of identity and cyber security articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays

9 Must-Read Cyber Security Articles, November 2020 Read More »

Healthcare Cybersecurity Articles, November 2020

10 Healthcare Cybersecurity Articles, November 2020

Ransomware, Compliance, and Zero Trust headline this week’s digest of healthcare cybersecurity articles. Thanks for checking out the biweekly digest of helpful healthcare cybersecurity articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare cybersecurity articles. Peruse our resources for webinars, case studies, infographics, and educational videos.

10 Healthcare Cybersecurity Articles, November 2020 Read More »

zero trust

Leveraging Zero Trust with Identity at the Core

Learn how you can leverage the Zero Trust Model to better protect your organization. The Changing Business Landscape The Covid-19 pandemic has made working from home the new norm, which has made it clear that the traditional concept of a well-defined network perimeter can’t be relied upon anymore for cybersecurity. A perimeter-centric defense where everyone

Leveraging Zero Trust with Identity at the Core Read More »

identity and cloud security articles

11 Identity and Cloud Security Articles, October 2020

Thanks for checking out this week’s digest of identity and cloud security articles. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET. 11 Identity and Cloud Security Articles   3 Areas of Legal Exposure

11 Identity and Cloud Security Articles, October 2020 Read More »

Helpful Healthcare Cybersecurity Articles

9 Helpful Healthcare Cybersecurity Articles, October 2020

Thanks for checking out the biweekly digest of helpful healthcare cybersecurity articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare cybersecurity articles. Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles,

9 Helpful Healthcare Cybersecurity Articles, October 2020 Read More »

Scroll to Top