Hanno Ekdahl

Idenhaus specializes in Identity and Access Management (IAM) and Cybersecurity. We help our clients reduce the risk of security breaches, eliminate audit findings, enhance regulatory compliance (Sarbanes-Oxley, Gramm-Leach-Bliley, and HIPAA), and safeguard customer information. Twitter: @idenhaus

A Fresh Approach to Cybersecurity, Part 3

This series, What is Cybersecurity?, outlines the basic tenets of how the three areas of the cybersecurity triangle may be implemented by an organization. The cybersecurity triangle (people, process, technology) has been the focus of the series, as it provides an easy, understandable framework for discussing what comprises cybersecurity and the areas of concentration to

A Fresh Approach to Cybersecurity, Part 3 Read More »

Top Cybersecurity Articles Trending this Week

Here are the top cybersecurity articles from January 14-27, 2016. Signup to receive biweekly updates here.    Nine of Ten Breaches Easily Avoidable, Study Finds Nine of every ten data breaches that occurred in the first eight months of 2015 were “easily avoidable,” underscoring the need for private sector investment in tools and processes to

Top Cybersecurity Articles Trending this Week Read More »

A Fresh Approach to Cybersecurity, Part 2

This four-part What is Cybersecurity? series discusses the impact of cybersecurity to an organization and the three approaches which must be addressed to achieve cybersecurity nirvana. Yet cybersecurity nirvana is truly never attainable due to the always evolving nature of cybersecurity. The evolution of cybersecurity is directly attributable to one area: people. In the first part

A Fresh Approach to Cybersecurity, Part 2 Read More »

6 Must-Read Cybersecurity Articles, January 2016

Here are the must-read Cybersecurity, Infosec, and Identity Management articles from January 1 – 13, 2016. You can sign up for our biweekly newsletter here.   Researchers Out Default Passwords Packaged With ICS/SCADA Wares Information was gathered on more than 100 products using default passwords such as “admin.admin,” “password,” “root,” and “administrator,” found in the open passwords lists and vendor documentation.

6 Must-Read Cybersecurity Articles, January 2016 Read More »

Getting Started with Data Loss Prevention: 4 Best Practices

Client A implemented DLP blocking early in the project and blocked several key business transactions. They had not defined a process to review and resolve false positives quickly, and once the business users became unhappy it led to the removal of the DLP solution. Organizations have had a tumultuous relationship with Data Loss Prevention solutions

Getting Started with Data Loss Prevention: 4 Best Practices Read More »

7 Articles Trending in Security this Week

  Security, AI, IoT, digital transformation to dominate 2016 “For all the benefits of increased agility, flexibility, productivity and convenience provided by IoT and smart devices, the system remains worryingly open to attack.” The year 2015 has been another exhilarating year in the technology industry, with advances in cloud computing, machine-to-machine (M2M) and the Internet

7 Articles Trending in Security this Week Read More »

A Fresh Approach to Cybersecurity, Part 1

This is the first installment of a four-part series on the equal nature approach to cybersecurity.  “If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.” ~Bruce Schneier What is Cybersecurity? The answer to “What is Cybersecurity?” changes every couple of years based on

A Fresh Approach to Cybersecurity, Part 1 Read More »

4 Identity Management Articles You May Have Missed

  Every two weeks we deliver a curated digest of Identity Management and Cybersecurity News to security leaders, IT professionals, and CISO/CSOs. Based on subscriber feedback, we’ve selected the most popular articles to highlight here.   BitLocker encryption can be defeated with trivial Windows authentication bypass In its own documentation, Microsoft admits that preboot authentication is “unacceptable

4 Identity Management Articles You May Have Missed Read More »

How a Solution Roadmap Aligns IT and Business Strategy

The challenge to successfully implement IT solutions that deliver their expected value to the organization is ongoing. According to an IBM study, only 40% of IT projects meet schedule, budget and quality goals. The root cause of this issue, according to the Project Management Institute, is a lack of alignment between the project and the

How a Solution Roadmap Aligns IT and Business Strategy Read More »

Scroll to Top