Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

healthcare IAM

7 Must-Read Healthcare IAM and Cybersecurity Articles

Identity Management and cybersecurity strategy headline this week’s Healthcare IAM and Cybersecurity news digest.  Thanks for checking out the biweekly Idenhaus Healthcare Identity Management and Cybersecurity roundup. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare IAM and Cybersecurity. Peruse our resources for webinars, case studies, […]

7 Must-Read Healthcare IAM and Cybersecurity Articles Read More »

Cybersecurity Articles

12 Must-Read Cybersecurity Articles, July 2020

Policy Based Access Control, IoT, and AI headline today’s digest of IAM and Cybersecurity articles.  Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity roundup. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources

12 Must-Read Cybersecurity Articles, July 2020 Read More »

healthcare identity management and cybersecurity

13 Healthcare Identity Management and Cybersecurity Articles

Internet of Medical Things (IoMT) security, ransomware, and telehealth headline this week’s Healthcare Identity Management and Cybersecurity news digest.  Thanks for checking out the biweekly Idenhaus Healthcare Identity Management and Cybersecurity roundup. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare Identity Management and Cybersecurity. Peruse our

13 Healthcare Identity Management and Cybersecurity Articles Read More »

Policy Based Access Control (PBAC)

What is Policy Based Access Control (PBAC)?

Learn how Policy Based Access Control (PBAC) combines semantic security risk management with a dynamic policy framework to mitigate security threats.  Organizations rely on a wide range of applications and operating systems to securely deliver value to their customers efficiently and effectively. In addition to this complexity, businesses are also working across multiple environments (OnPrem

What is Policy Based Access Control (PBAC)? Read More »

IAM and Cybersecurity Articles

14 Must-Read IAM and Cybersecurity Articles, June 2020

Identity Governance, IAM, Edge Computing, and Cyber Risk are covered in this digest of IAM and Cybersecurity articles.  Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity roundup. We have started breaking this digest into 2 articles – general Identity Management and healthcare-focused cybersecurity. Click here to view this week’s healthcare-focused cybersecurity digest.

14 Must-Read IAM and Cybersecurity Articles, June 2020 Read More »

10 Healthcare Identity and Cybersecurity Articles

10 Healthcare Identity and Cybersecurity Articles, June 2020

Edge Computing, EHR Overhaul, IGA, and Telehealth headline this week’s Healthcare Identity and Cybersecurity news digest.  Thanks for checking out the biweekly Idenhaus Healthcare Identity and Cybersecurity roundup. We have started breaking this digest into 2 articles – general Identity Management (published on Thursday) and healthcare identity and cybersecurity. Click here to view this week’s

10 Healthcare Identity and Cybersecurity Articles, June 2020 Read More »

Identity Governance Administration

How Identity Governance Administration (IGA) Helps Protect Intellectual Property

Identity Governance Administration (IGA) solutions are designed to evaluate and enforce security policies to manage user access and protect sensitive information.  Protecting intellectual property and trade secrets has been a key driver of competitive advantage; however, protecting these vital assets has become more challenging as technology has evolved. In the age of Digital Transformation, it

How Identity Governance Administration (IGA) Helps Protect Intellectual Property Read More »

Identity and Cybersecurity Articles

16 Must-Read Identity and Cybersecurity Articles, June 2020

Privacy, vulnerabilities in open source code, and looking beyond COVID-19 headline this week’s Identity and Cybersecurity news digest.  Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity roundup. Every 2 weeks, we curate a selection of IGA, Healthcare, Identity and Cybersecurity articles. Check out our resources section for webinars, case studies, infographics, and

16 Must-Read Identity and Cybersecurity Articles, June 2020 Read More »

2020 data breach investigations report

Data Breaches Hurt Small Businesses, Too!

Most observant and thoughtful senior executives are by now familiar with the threat posed by hackers and the core concepts of cybersecurity. Likewise, sophisticated Small and Medium-sized Business (SMB) leaders have also paid attention to the cybersecurity landscape and have invested some effort to protect themselves from a breach. Nonetheless, Verizon’s 2020 Data Breach Investigation

Data Breaches Hurt Small Businesses, Too! Read More »

Scroll to Top