Cybersecurity

Building A New Foundation for Decentralized Identity

Written by Ron Bowron For those of us from the Apple IIe and the Windows 3.1 Generation, we all remember the days of “Granted until Denied” permissions and the simple Access Control List. Imagine having full access to the computer and all the system’s resources just by logging in?  We were gods in our own …

Building A New Foundation for Decentralized Identity Read More »

Does Your Organization Need An IAM Strategy?

  Do You Need An IAM Strategy? There is a well-known management book titled “What got you here, won’t get you there”. The basic premise is that future success begins with a commitment to continuous improvement, especially for those people who have already achieved an initial level of success. The central imperative is to challenge …

Does Your Organization Need An IAM Strategy? Read More »

How to Achieve NIST 800-171 Compliance

  How to Achieve NIST 800-171 Compliance Written by Sajid Shafique For many organizations that process or store Controlled Unclassified Information, or CUI, for Government agencies, compliance with NIST 800-171 is often a contractual obligation. Previously we have discussed what is meant by CUI and explained what NIST 800-171 compliance is. In today’s article, we …

How to Achieve NIST 800-171 Compliance Read More »

Atlanta Business RadioX Interview with Idenhaus’ Hanno Ekdahl

The last two years have been tumultuous for many organizations, and we have seen an explosion in demand for cybersecurity and Identity and Access Management solutions to help them adapt. Organizations are more reliant now than ever before on their IT systems to keep up with their clients, partners, and employees. Because the demand was …

Atlanta Business RadioX Interview with Idenhaus’ Hanno Ekdahl Read More »

Cybersecurity and Healthcare Updates

This week, we explore the new trend of distributed denial of service (ddos) attacks on the healthcare sector,  the major skills gap in healthcare IT cybersecurity training, and more in our healthcare-focused cybersecurity update.    Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of …

Cybersecurity and Healthcare Updates Read More »

Reducing Organization's Legal Exposure

Reducing An Organization’s Legal Exposure After a Cyber Breach

Post Breach Denial Increases an Organization’s Legal Exposure How can you reduce an organization’s legal exposure immediately following a data breach? Cybersecurity events like data breaches make headlines regularly and cost businesses millions in fines and lawsuits. Breach announcements topple executives, destroy shareholder confidence, push customers away, invite regulatory scrutiny, and inflict lasting damage to organizations. Right after …

Reducing An Organization’s Legal Exposure After a Cyber Breach Read More »

Common Pre-Breach Mistakes

5 Common Pre-Breach Mistakes, Mistake Number Five: Poor Insurance Planning

5 Most Common Pre-Breach Mistakes That Organizations Make With Cyber Security Fifth Mistake: Poor Insurance Planning Much like any security incident, there is always “before” and “after” in a cyber security breach. When looking at the incident after the fact, one of the major issues that can come up is cyber insurance. In 2021, there …

5 Common Pre-Breach Mistakes, Mistake Number Five: Poor Insurance Planning Read More »

Healthcare IAM Professionals’ August Articles

This week, HIMSS 2021 is going on, so follow along with our link to Live Coverage. Keep yourself updated on the latest healthcare IT news, like the proliferation of ransomware today, a demonstration of the importance of Information Security Policies, and a debate about the efficacy of paying ransoms if your data is ever stolen.  …

Healthcare IAM Professionals’ August Articles Read More »

Pre-Breach Mistakes Organizations Make With Cyber Security

Join us for the third installment of our series, 5 Most Common Pre-Breach Mistakes Organizations make with Cyber Security. Last time we talked about Mistake Two: Poor Use of Outside Assesors. Today we’re discussing the third mistake, talking up your cyber security, and not putting those talking points into action. Third Mistake: Touting Information Security …

Pre-Breach Mistakes Organizations Make With Cyber Security Read More »

Scroll to Top