
What is ChatGPT?
What is ChatGPT? Written by Chat GPT and Ashley Nicholson At Idenhaus, we like to stay well informed on new and emerging technologies. That said, a new AI technology that has recently emerged has us impressed – and a bit cautious as well. While the amazing things that can be done with AI are now

Idenhaus is a Best of Georgia Winner
Idenhaus is a Best of Georgia® Regional Winner The votes have been counted and the results are in! Idenhaus is officially a 2022 Best of Georgia® Regional winner in Georgia Business Journal’s annual readers’ poll! We are humbled by this recognition, and look forward to many more years of local interactions to come. Georgia

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans
What’s the Magic Number? The Optimal Frequency of Penetration Tests & Vulnerability Scans This is the million dollar question of security professionals year after year: How often should one perform Pen Tests and Vuln Scans for their organization? While there is no right or wrong answer, and each organization has its own unique security

How Do I Become CMMC Certified?
Last week, we learned what CMMC is, all the revisions you’ve been hearing about, and when all defense industrial case (DIB) contractors are required to be CMMC 2.0 compliant. By the way, it’s May 2023. Today, we’re going to walk through what controls and requirements are, and how to get CMMC 2.0 certified. Creating a

What is Cybersecurity Maturity Model Certification (CMMC)?
First: The Definition of a Maturity Model. Okay, before we jump into CMMC, it’s important to understand what a maturity model is… which is a tool to measure the ability of an organization to continuously improve in a particular discipline. Organizations use these frameworks as a baseline to gauge their current state in a specific

Identity and Orchestration, New Cybersecurity Amendments in New York, and More
We’ve said it before and we’ll say it again – cybersecurity is made up of all the different people who use it, and sometimes even those who abuse it. This week we want to again highlight the role that insider threats can play on your organization’s cybersecurity. While the ransomware trend overall seems to be

Cybersecurity Requirements for Medical Devices Remain Unchanged, Rural Healthcare In Flux, and More
With the changing of the seasons, it can be all too easy to forget your cybersecurity plans in the influx of cold, flu, and seasonal allergy patients. However, it’s important all year long to keep your cybersecurity plans up to date and ready to deploy at the drop of a hat (and hopefully not at

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology
Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology By Kimber Householder A project management methodology is a set of guidelines and procedures that will help project managers organize projects for maximum effectiveness. Fundamentally, it’s a structure or checklist to follow that aids in effectively managing the project process. Project management (PM) is crucial
Recent Posts
Newsletter Signup
Why You Need An IAM Roadmap
