Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

identity management digest

Idenhaus Cybersecurity and Identity Management Digest, September 2020

Business Email Compromise (BEC), Cloud Security, and Privacy headline this week’s Identity Management digest. Thanks for checking out this week’s Identity Management digest. Click here to view healthcare-focused cybersecurity articles. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.   Idenhaus […]

Idenhaus Cybersecurity and Identity Management Digest, September 2020 Read More »

11 Healthcare Cybersecurity Articles You May Have Missed

11 Healthcare Cybersecurity Articles You May Have Missed

Thanks for checking out the biweekly digest of Idenhaus Healthcare Cybersecurity articles. We have started breaking this into 2 posts – general Identity Management (published on Thursday) and Healthcare IAM and Cybersecurity. Peruse our resources for webinars, case studies, infographics, and educational videos. You can subscribe to receive the biweekly Healthcare Cybersecurity Articles, delivered Tuesdays

11 Healthcare Cybersecurity Articles You May Have Missed Read More »

cybersecurity incident response

Cybersecurity Incident Response: Everything You Need To Know

Cybersecurity incident response begins with a proactive strategy and well-defined processes. Rapid proliferation and widespread use of Cloud computing services have given rise to an increased dependency on maintaining robust security for business continuity and supporting mission-critical operations. Incident response, which is one of the most critical domains of cybersecurity, begins with a proactive strategy

Cybersecurity Incident Response: Everything You Need To Know Read More »

IDM and cybersecurity articles

12 IDM and Cybersecurity Articles You May Have Missed

IoT Security, CPRA, ransomware, and more are featured in this digest of IDM and Cybersecurity articles.    Thanks for checking out the biweekly digest of IDM and Cybersecurity articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse

12 IDM and Cybersecurity Articles You May Have Missed Read More »

healthcare cyber security articles

10 Must-Read Healthcare Cyber Security Articles

Ransomware, privacy legislation, and health IT trends headline this digest of Healthcare Cyber Security Articles. Thanks for checking out the biweekly Idenhaus Healthcare Cyber Security articles. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare IAM and Cybersecurity. Peruse our resources for webinars, case studies, infographics,

10 Must-Read Healthcare Cyber Security Articles Read More »

identity management articles

14 Must-Read Identity Management Articles

 Zero Trust, Privacy Legislation, and Policy Based Access Control headline this digest of Identity Management articles.  Thanks for checking out the biweekly digest of Identity Management articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources for webinars, case studies,

14 Must-Read Identity Management Articles Read More »

healthcare cybersecurity news

8 Insightful Healthcare Cybersecurity News Articles

HIPAA compliance, Zero Trust, and the (in)security of telehealth headline this week’s Healthcare Cybersecurity news digest.  Thanks for checking out the biweekly Idenhaus Healthcare Cybersecurity news digest. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare IAM and Cybersecurity. Peruse our resources for webinars, case studies,

8 Insightful Healthcare Cybersecurity News Articles Read More »

learning-about-policy-based-access-control-pbac-webinar

Learning about Policy Based Access Control

Policy Based Access Control (PBAC) uses digital policies comprised of logical rules to maintain and evaluate user access dynamically. As organizations embrace digital transformation and adopt Cloud-based services, access control models grow in importance to protect the firm’s intellectual property. Role Based Access Control has been a key component of most organization’s access management strategy;

Learning about Policy Based Access Control Read More »

cybersecurity articles

6 Must-Read Cybersecurity Articles, July 2020

IAM, security breach response, and social engineering headline today’s digest of IAM and Cybersecurity articles.  Thanks for checking out the biweekly digest of Identity Management and Cybersecurity articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources for webinars, case

6 Must-Read Cybersecurity Articles, July 2020 Read More »

Scroll to Top