Cybersecurity

Why Defense-in-Depth Is Critical to Cybersecurity Strategy

Since the inception of Cybersecurity twenty-plus years ago, the industry has gone through a plethora of iterations. The Internet was initially designed to be an open environment to  enable information sharing between academics and researchers. When businesses and government agencies joined the network explosion in the late 1990s, the open environment turned into a security […]

Why Defense-in-Depth Is Critical to Cybersecurity Strategy Read More »

7 Must-Read Identity Management & Cybersecurity Articles, May 2016

Watch a US Power Grid get hacked, learn how Troy Hunt verifies data “breaches”, and check out Anton Chuvakin’s new “Understanding Insider Threats” paper in this week’s Identity Management and Cybersecurity digest. Get this biweekly update delivered a day earlier by signing up for our newsletter.   6 privacy landmines and how to avoid stepping

7 Must-Read Identity Management & Cybersecurity Articles, May 2016 Read More »

6 Must-Read Articles for Cybersecurity Pros, May 2016

Today’s roundup of IAM and Cybersecurity news includes ICS malware, biometric identity management, ATM skimming, the threat landscape, and more. Get this biweekly update delivered a day earlier by signing up for our newsletter.   Wells Fargo to Roll Out Eye-Scans for Mobile App Sign-In American banking giant Wells Fargo plans to go ahead with

6 Must-Read Articles for Cybersecurity Pros, May 2016 Read More »

What Is Threat Intelligence, Anyway?

This article was authored by Idenhaus’ Director of Cybersecurity, Derek Christensen. Threat Intelligence is experiencing its 15 minutes of fame as this year’s cybersecurity buzzword. It was a session topic at last month’s RSA Conference – From an Unknown Discipline to Cyber-Buzzword – and is considered a “must have” for all security analysts. Practically everyone is going on

What Is Threat Intelligence, Anyway? Read More »

5 Must-Read Identity Management Articles, April 2016

  This week’s curated Identity Management & Cybersecurity News covers crippling ransomware, healthcare breaches, IAM challenges for industrial systems, new HIPAA protocol, and more. Get this biweekly update delivered to your inbox. OK, panic—newly evolved ransomware is bad news for everyone There’s something inherently world-changing about the latest round of crypto-ransomware that has been hitting a wide range

5 Must-Read Identity Management Articles, April 2016 Read More »

5 Must-Read IDM & Cybersecurity Articles, April 2016

This week’s roundup of Identity Management and Cybersecurity news includes threat hunting links, how negligence affects cyber breach insurance, screenshots of insecure SCADA systems, and the dangers posed to your organization by human weakness. These articles appeared in the April 5, 2016 Idenhaus Newsletter. Subscribe for future biweekly updates here.   1. How to understand the

5 Must-Read IDM & Cybersecurity Articles, April 2016 Read More »

A Fresh Approach to Cybersecurity, Part 4

Technology is a third rail because the implementation of technology is by far the easiest thing to mess up for any organization and no one wants to talk about it. This is the last installment of the four-part “What is Cybersecurity?” series. While no ground-breaking truths have been uncovered, we’ve presented information that is necessary for leadership and

A Fresh Approach to Cybersecurity, Part 4 Read More »

Scroll to Top