Data Quality

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans

What’s the Magic Number? The Optimal Frequency of Penetration Tests & Vulnerability Scans   This is the million dollar question of security professionals year after year: How often should one perform Pen Tests and Vuln Scans for their organization? While there is no right or wrong answer, and each organization has its own unique security …

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans Read More »

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology By Kimber Householder A project management methodology is a set of guidelines and procedures that will help project managers organize projects for maximum effectiveness. Fundamentally, it’s a structure or checklist to follow that aids in effectively managing the project process. Project management (PM) is crucial …

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology Read More »

identity management articles

14 Must-Read Identity Management Articles

 Zero Trust, Privacy Legislation, and Policy Based Access Control headline this digest of Identity Management articles.  Thanks for checking out the biweekly digest of Identity Management articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources for webinars, case studies, …

14 Must-Read Identity Management Articles Read More »

HR Rebellion

Mastering Identity Management: Is HR Creating a Hostile Work Environment?

Identity and Access Management (IAM) is a unique IT solution because of its far-reaching scope. IAM touches everyone and everything in an organization.  Its reach extends from HR processes to the physical and system access of each individual. Once IAM goes live, the entire employee lifecycle is driven by the HR team and how they …

Mastering Identity Management: Is HR Creating a Hostile Work Environment? Read More »

idenhaus-biweekly-data-quality

Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance

Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here. Security Thought of the Week Taking a “Systems …

Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance Read More »

7 Must-Read Cybersecurity Articles, July 2018

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Learn how to overcome common data quality problems in our upcoming webinar on July 20, 2018, at 12 …

7 Must-Read Cybersecurity Articles, July 2018 Read More »

Mastering Identity Management: The Data Quality Divide

Data quality in HRIS systems can be defined in a number of ways and will have a significant impact on how Identity and Access Management (IAM) solutions work in the organization and how data quality is managed across the IT environment. From HR or business operations perspective, data is often evaluated based on whether it …

Mastering Identity Management: The Data Quality Divide Read More »

data-identity-management

7 Must-Read Identity & Access Management Articles, June 2018

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Many organizations experience the hidden costs of low-quality user data, which makes automating routine Identity Management …

7 Must-Read Identity & Access Management Articles, June 2018 Read More »