Building a Culture of Cybersecurity with Strategies for Training and Awareness

Building a Culture of Cybersecurity: Strategies for Training and Awareness Written by TJ Rubeck In today’s rapidly evolving threat landscape, employees are often considered the weakest link in cybersecurity. Attackers often target human vulnerabilities through social engineering attacks, phishing, or other related threats. The increasing frequency and sophistication of cyber attacks have made one thing […]

Modernizing Your Identity Fabric

By Leah Livingston Idenhaus attended one of the Gartner sessions titled, “Implementing a Modern Identity Fabric” led by Vadim Lander of Broadcom and Kanishak Varshney of Ameriprise. Identity management is now a critical role in organizations’ overall cybersecurity strategy. Broadcom and Ameriprise shared their tips and experiences in working towards a more modern IAM infrastructure […]

AI to the Rescue for Identity Governance Access Certifications 

AI to the Rescue for Identity Governance Access Certifications … not so fast! Written by Ron Bowron In today’s digital world, businesses face numerous cybersecurity threats, making it essential to ensure that only authorized personnel can access sensitive data. Identity and Governance Access Certification Campaigns are an effective way to certify and review user access […]

Role-based Access Control in Large Organizations

Role-based Access Control in Large Organizations By Hanno Ekdahl  As organizations grow, their ability to accurately and efficiently manage access for their users to the systems and applications they need to be effective becomes increasingly difficult. To offset this complexity, most organizations invest in an identity management solution to automate user provisioning and provide a […]

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans

What’s the Magic Number? The Optimal Frequency of Penetration Tests & Vulnerability Scans   This is the million dollar question of security professionals year after year: How often should one perform Pen Tests and Vuln Scans for their organization? While there is no right or wrong answer, and each organization has its own unique security […]

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology By Kimber Householder A project management methodology is a set of guidelines and procedures that will help project managers organize projects for maximum effectiveness. Fundamentally, it’s a structure or checklist to follow that aids in effectively managing the project process. Project management (PM) is crucial […]

14 Must-Read Identity Management Articles

identity management articles

 Zero Trust, Privacy Legislation, and Policy Based Access Control headline this digest of Identity Management articles.  Thanks for checking out the biweekly digest of Identity Management articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources for webinars, case studies, […]

Mastering Identity Management: Is HR Creating a Hostile Work Environment?

HR Rebellion

Identity and Access Management (IAM) is a unique IT solution because of its far-reaching scope. IAM touches everyone and everything in an organization.  Its reach extends from HR processes to the physical and system access of each individual. Once IAM goes live, the entire employee lifecycle is driven by the HR team and how they […]

Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance


Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here. Security Thought of the Week Taking a “Systems […]

Mini Case Study: Getting a Handle on User Data


Nicole Keaton Hart and Hanno Ekdahl share a mini case study on the importance of establishing a system of record to maintain user data quality.   Identity Management (IAM) is built around the concept of a system of record and establishing a “Gold Standard” data set for each user that is: 1) accurate, 2) actively […]