Data Quality

Unprepared and Vulnerable: Understanding Disaster Recovery Planning, Risks, DRaaS, and the Benefits of In-House Solutions

Unprepared and Vulnerable: Understanding Disaster Recovery Planning, Risks, DRaaS, and the Benefits of In-House Solutions   By Sandhya Sukumar    Along with the risks of natural disasters, human errors, hardware, and infrastructure failures, one can consider “cyberattacks” as one of the top risks that an organization must prepare for.  Hence, Disaster Recovery planning is essential […]

Unprepared and Vulnerable: Understanding Disaster Recovery Planning, Risks, DRaaS, and the Benefits of In-House Solutions Read More »

Building a Culture of Cybersecurity with Strategies for Training and Awareness

Building a Culture of Cybersecurity: Strategies for Training and Awareness Written by TJ Rubeck In today’s rapidly evolving threat landscape, employees are often considered the weakest link in cybersecurity. Attackers often target human vulnerabilities through social engineering attacks, phishing, or other related threats. The increasing frequency and sophistication of cyber attacks have made one thing

Building a Culture of Cybersecurity with Strategies for Training and Awareness Read More »

Modernizing Your Identity Fabric

By Leah Livingston Idenhaus attended one of the Gartner sessions titled, “Implementing a Modern Identity Fabric” led by Vadim Lander of Broadcom and Kanishak Varshney of Ameriprise. Identity management is now a critical role in organizations’ overall cybersecurity strategy. Broadcom and Ameriprise shared their tips and experiences in working towards a more modern IAM infrastructure

Modernizing Your Identity Fabric Read More »

AI to the Rescue for Identity Governance Access Certifications 

AI to the Rescue for Identity Governance Access Certifications … not so fast! Written by Ron Bowron In today’s digital world, businesses face numerous cybersecurity threats, making it essential to ensure that only authorized personnel can access sensitive data. Identity and Governance Access Certification Campaigns are an effective way to certify and review user access

AI to the Rescue for Identity Governance Access Certifications  Read More »

Role-based Access Control in Large Organizations

Role-based Access Control in Large Organizations By Hanno Ekdahl  As organizations grow, their ability to accurately and efficiently manage access for their users to the systems and applications they need to be effective becomes increasingly difficult. To offset this complexity, most organizations invest in an identity management solution to automate user provisioning and provide a

Role-based Access Control in Large Organizations Read More »

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans

What’s the Magic Number? The Optimal Frequency of Penetration Tests & Vulnerability Scans   This is the million dollar question of security professionals year after year: How often should one perform Pen Tests and Vuln Scans for their organization? While there is no right or wrong answer, and each organization has its own unique security

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans Read More »

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology By Kimber Householder A project management methodology is a set of guidelines and procedures that will help project managers organize projects for maximum effectiveness. Fundamentally, it’s a structure or checklist to follow that aids in effectively managing the project process. Project management (PM) is crucial

Defining Waterfall vs. Agile vs. Hybrid Sprinting Project Management Methodology Read More »

identity management articles

14 Must-Read Identity Management Articles

 Zero Trust, Privacy Legislation, and Policy Based Access Control headline this digest of Identity Management articles.  Thanks for checking out the biweekly digest of Identity Management articles. We have started breaking this digest into two – general Identity Management and healthcare-focused cybersecurity articles. Click here to view this week’s healthcare-focused cybersecurity digest. Peruse our resources for webinars, case studies,

14 Must-Read Identity Management Articles Read More »

HR Rebellion

Mastering Identity Management: Is HR Creating a Hostile Work Environment?

Identity and Access Management (IAM) is a unique IT solution because of its far-reaching scope. IAM touches everyone and everything in an organization.  Its reach extends from HR processes to the physical and system access of each individual. Once IAM goes live, the entire employee lifecycle is driven by the HR team and how they

Mastering Identity Management: Is HR Creating a Hostile Work Environment? Read More »

idenhaus-biweekly-data-quality

Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance

Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos. Subscribe to the Idenhaus biweekly newsletter here. Security Thought of the Week Taking a “Systems

Idenhaus Biweekly: Data Quality, PAM, (Lack of) GDPR Compliance Read More »

Scroll to Top