California Privacy Rights Act (CPRA)

What is the California Privacy Rights Act (CPRA)?

Senior Privacy Consultant Jodi Daniels shares why you need to have the California Privacy Rights Act (CPRA) on your privacy radar.  While the California Consumer Privacy Act (CCPA) has just become enforceable as of July 1, there’s another privacy rights act lining up for the November 2020 ballot. This new act aims to build off

Read More »
identity management articles

14 Must-Read Identity Management Articles

 Zero Trust, Privacy Legislation, and Policy Based Access Control headline this digest of Identity Management articles.  Thanks for checking out the biweekly digest of Identity Management articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources for webinars, case studies,

Read More »
healthcare cybersecurity news

8 Insightful Healthcare Cybersecurity News Articles

HIPAA compliance, Zero Trust, and the (in)security of telehealth headline this week’s Healthcare Cybersecurity news digest.  Thanks for checking out the biweekly Idenhaus Healthcare Cybersecurity news digest. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare IAM and Cybersecurity. Peruse our resources for webinars, case studies,

Read More »
learning-about-policy-based-access-control-pbac-webinar

Learning about Policy Based Access Control

Policy Based Access Control (PBAC) uses digital policies comprised of logical rules to maintain and evaluate user access dynamically. As organizations embrace digital transformation and adopt Cloud-based services, access control models grow in importance to protect the firm’s intellectual property. Role Based Access Control has been a key component of most organization’s access management strategy;

Read More »
cybersecurity articles

6 Must-Read Cybersecurity Articles, July 2020

IAM, security breach response, and social engineering headline today’s digest of IAM and Cybersecurity articles.  Thanks for checking out the biweekly digest of Identity Management and Cybersecurity articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources for webinars, case

Read More »
healthcare IAM

7 Must-Read Healthcare IAM and Cybersecurity Articles

Identity Management and cybersecurity strategy headline this week’s Healthcare IAM and Cybersecurity news digest.  Thanks for checking out the biweekly Idenhaus Healthcare Identity Management and Cybersecurity roundup. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare IAM and Cybersecurity. Peruse our resources for webinars, case studies,

Read More »
Liability Risks from Security Breaches

3 Liability Risks from Security Breaches

Organizations that are breached are in an unusual position as both the victim of a crime and as a responsible party for the damages caused by the hacker. The legal exposure rises from the fact that either a regulator or a private litigant (or both) want to hold your company responsible for the crime that

Read More »
Cybersecurity Articles

12 Must-Read Cybersecurity Articles, July 2020

Policy Based Access Control, IoT, and AI headline today’s digest of IAM and Cybersecurity articles.  Thanks for checking out the biweekly Idenhaus Identity Management and Cybersecurity roundup. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources

Read More »
Scroll to Top