Cybersecurity

gdpr-birthday-idenhaus

One Year Later: How GDPR Continues to Change the Privacy World

This post originally appeared on the Red Clover Advisors Blog. The privacy world is recognizing a big birthday this year. Europe’s General Data Protection Regulation (GDPR) officially hit its year-one milestone on May 25, 2019. But you probably won’t be celebrating. That’s because most companies still have a lot of work left to do when it comes …

One Year Later: How GDPR Continues to Change the Privacy World Read More »

jodi daniels gdpr

What You Need to Know About GDPR Compliance with Jodi Daniels

Senior privacy consultant Jodi Daniels shares why consumer trust is a key business driver for General Data Protection Regulation (GDPR) compliance. Our GDPR Overview discusses how the General Data Protection Regulation affects all companies that collect user data from and/or do business with citizens in the European Union. While GDPR compliance is often evaluated in …

What You Need to Know About GDPR Compliance with Jodi Daniels Read More »

idenhaus-biweekly

Idenhaus Biweekly: IAM Roadmap, M&A Due Diligence, and Upcoming Webinars

Thanks for reading the Idenhaus biweekly digest of insightful Identity Management, data security, & Cybersecurity articles. We curate a diverse selection of IAM, RBAC, GDPR, and Identity Governance articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here.   Why Your Organization Needs an IAM Roadmap via Idenhaus Did you know that over half of …

Idenhaus Biweekly: IAM Roadmap, M&A Due Diligence, and Upcoming Webinars Read More »

jodi-daniels-gdpr-overview-idenhaus

GDPR Overview with Jodi Daniels, Privacy Consultant

Privacy consultant Jodi Daniels provides an overview of the General Data Protection Regulation (GDPR).   GDPR is the most important change in data privacy in the past 20 years and fundamentally reshapes the way data is handled across every sector. Jodi Daniels is the founder and CEO of Red Clover Advisors, a boutique data privacy consultancy, …

GDPR Overview with Jodi Daniels, Privacy Consultant Read More »

rsa-2019-security-challenges-moving-to-cloud-idenhaus

RSA 2019 Highlights: Security Challenges Moving to the Cloud

Let’s take a look at the Security Foundations Seminar that kicked off the RSA 2019 conference in San Francisco, California last week. The full-day session featured multiple speakers and presentations to shed light on the process of defining and deploying security frameworks, foundations, and architectures. One topic covered in depth was the security challenges involved with …

RSA 2019 Highlights: Security Challenges Moving to the Cloud Read More »

idenhaus-consulting-biweekly-idaas

7 Must-Read IDaaS, Cybersecurity, and PAM Articles, February 2019

Thanks for reading our biweekly digest of Cyber security and Identity Management articles. We curate a diverse selection of IAM, IDaaS, Cybersecurity, and RBAC articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. This week’s news digest includes 7 informative IDaaS, PAM, and identity management articles from late February 2019. Enjoy!   …

7 Must-Read IDaaS, Cybersecurity, and PAM Articles, February 2019 Read More »

cybersecurity privacy

9 Must-Read Cybersecurity, Privacy, and IAM Articles, February 2019

Thanks for reading our biweekly digest of Cybersecurity, Privacy, and Identity Management articles. We curate a diverse selection of IAM, Identity Governance, Cyber Risk, and RBAC articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. This week’s news digest includes 9 informative cybersecurity, privacy, and access management articles from February 2019. Enjoy! …

9 Must-Read Cybersecurity, Privacy, and IAM Articles, February 2019 Read More »

pre-breach cybersecurity mistake

5 Most Common Pre-Breach Cybersecurity Mistakes and How to Avoid Them

Cyber law attorney Doug Meal shares the 5 most common pre-breach cybersecurity mistakes companies make and how to avoid them. How can your organization protect itself from legal exposure in the event of a Cybersecurity Breach? In Atlanta last week, the Cyber Education Foundation hosted the Symposium on Cyber Culture and Team Building. Cybersecurity is about …

5 Most Common Pre-Breach Cybersecurity Mistakes and How to Avoid Them Read More »

9 Insightful Cybersecurity & Access Management Articles, January 2019

Thanks for reading our biweekly digest of Identity, Cybersecurity, and Access Management articles. We curate a diverse selection of IdM, IGA, privacy, and cybersecurity articles to help you navigate the rapidly-changing IT security landscape. Subscribe to our biweekly newsletter here. This week’s news digest includes 9 informative and insightful identity and access management articles from January 2019. Enjoy!   …

9 Insightful Cybersecurity & Access Management Articles, January 2019 Read More »

cybersecurity articles

7 Must-Read IDM & Cybersecurity Articles, January 2019

Thanks for reading the biweekly Idenhaus Identity Management & Cybersecurity digest. We curate a diverse selection of access management, RBAC, & cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. This week’s news digest includes 7 informative and insightful IAM and cybersecurity articles from late December 2018 and early January 2019. Enjoy! …

7 Must-Read IDM & Cybersecurity Articles, January 2019 Read More »

Scroll to Top