Security

jodi-daniels-gdpr-overview-idenhaus

GDPR Overview with Jodi Daniels, Privacy Consultant

Privacy consultant Jodi Daniels provides an overview of the General Data Protection Regulation (GDPR).   GDPR is the most important change in data privacy in the past 20 years and fundamentally reshapes the way data is handled across every sector. Jodi Daniels is the founder and CEO of Red Clover Advisors, a boutique data privacy consultancy, …

GDPR Overview with Jodi Daniels, Privacy Consultant Read More »

9 Must-Read Security & Identity Management Articles, June 2018

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are 9 informative IAM and security articles from June 2018. Enjoy! The Role of Identity …

9 Must-Read Security & Identity Management Articles, June 2018 Read More »

6 Cyber Risk Insights from AIG and Axio’s Executive Risk Summit

Idenhaus recently attended AIG and Axio’s Executive Risk Summit, which brought together a panel of insurance experts to discuss Cyber Risk management. Cyber exposures are expanding rapidly as businesses move their IT systems to the cloud and adopt the Internet of Things (IoT) and Bring Your Own Device (BYOD). These changes introduce fundamental new threats to businesses of …

6 Cyber Risk Insights from AIG and Axio’s Executive Risk Summit Read More »

Colossal Equifax Data Breach Is Ominous Warning for Corporations

The massive scope of the Equifax data breach is almost as horrifying as the confidential personal data that was exposed. Approximately half of the U.S. population was impacted, as well as consumers in the U.K. and Canada. The sensitivity of the data (national id, financial history, addresses, birth date, etc.) makes this breach more serious …

Colossal Equifax Data Breach Is Ominous Warning for Corporations Read More »

What Is Threat Intelligence, Anyway?

This article was authored by Idenhaus’ Director of Cybersecurity, Derek Christensen. Threat Intelligence is experiencing its 15 minutes of fame as this year’s cybersecurity buzzword. It was a session topic at last month’s RSA Conference – From an Unknown Discipline to Cyber-Buzzword – and is considered a “must have” for all security analysts. Practically everyone is going on …

What Is Threat Intelligence, Anyway? Read More »

Top Cybersecurity Articles Trending this Week

Here are the top cybersecurity articles from January 14-27, 2016. Signup to receive biweekly updates here.    Nine of Ten Breaches Easily Avoidable, Study Finds Nine of every ten data breaches that occurred in the first eight months of 2015 were “easily avoidable,” underscoring the need for private sector investment in tools and processes to …

Top Cybersecurity Articles Trending this Week Read More »

9 Cyber Security Questions Every Executive Should Ask

According to 2015 Cost of Cyber Crime, recently released by The Ponemon Institute, the minimum cost of cyber crime to a company was $1.9M while the maximum cost was as much as $65M. As news of major cyber attacks becomes an almost weekly occurrence, organizations are still struggling to define a security model and determine how …

9 Cyber Security Questions Every Executive Should Ask Read More »

Takeaways from the 2015 Cybersecurity Forum in Atlanta

Here are some cool takeaways from the Cybersecurity Forum with Israel and the American South hosted by Baker Donelson at Georgia Tech. The conference was broad in scope and addressed a wide range of issues in Cybersecurity across people, process, and technology. Here are some of the most impactful sound bites from the forum: Today, …

Takeaways from the 2015 Cybersecurity Forum in Atlanta Read More »

Part 2: Defining Roles for IAM – From the Bottom Up

We believe that a two-pronged approach to roles definition is the key to implementing Role Based Access Control (RBAC) successfully. While there are tools that can automate the ‘bottom up’ approach, the old adage “Garbage In, Garbage Out” applies. If the data that you are basing your role definition on are bad, then a bottom …

Part 2: Defining Roles for IAM – From the Bottom Up Read More »

Scroll to Top