6 Common Identity Challenges That Can Be Addressed in an IAM Strategy Written by Hanno Ekdahl When it comes to Idenhaus, you would be right to assume that we take cybersecurity and identity management seriously. We like to think of Identity and Access Management as more than just a way to keep an organization secure,
In Part 1, we covered Identifying and Categorizing risks. After identifying what could happen to derail your project, what next? Spending the time to analyze and mitigate risk before undertaking a project can save you heartache, worry, and money in the long run. We all inherently identify and analyze risks at different levels of detail.
Risk Analysis & Mitigation: Part 1 By Kimber Householder All projects have risks. Understanding the risks and how to avoid / recover from them are key to successful project management. Spending the time to analyze and mitigate risk before undertaking a project can save you heartache, worry, and money in the long run. We all
How to Achieve NIST 800-171 Compliance Written by Sajid Shafique For many organizations that process or store Controlled Unclassified Information, or CUI, for Government agencies, compliance with NIST 800-171 is often a contractual obligation. Previously we have discussed what is meant by CUI and explained what NIST 800-171 compliance is. In today’s article, we
By Sajid Shafique Explaining NIST SP 800-171 The scope and scale of supply chain cyberattacks have continued to evolve over the years as Advanced Persistent Threat (APT) actors have become more and more dangerous and sophisticated with their attack methods. This is clearly demonstrated by the massive SolarWinds cyberattack, where Russian hackers compromised a
While the end of a year can be a time of reflection, it can also bring new energy for the coming year. 2021 was a year of many ups and downs, but while we can focus on the bed news, this is a reminder to look at the good as well. For every breach or
With 2022 just around the corner, there’s nothing quite like looking at what the trends for the next year might be in healthcare, cybersecurity, and the dynamic systems that surround them both. Whether the future is zero-trust, or if we find a more promising avenue, these security ideas will spread through 2022 and beyond. Idenhaus
‘Tis the time of year to look back at our triumphs and see what we can bring to the new year. This last post of 2021 explores Idenhaus’ top five posts of the year. Which of these was your favorite? Or did you prefer a post we made on another topic? Let us know in