Security

penetration testing

Penetration Testing: Everything You Need to Know

Each year, cyber-attacks are getting more complex. Organizations cannot afford to implement security tools without validating that they are properly performing. Ineffective controls and human error can expose the most sophisticated systems to breaches, which often go undetected for months or even years. The best way to be proactive against the threat of a cyber-attack […]

Penetration Testing: Everything You Need to Know Read More »

cybersecurity incident response

Cybersecurity Incident Response: Everything You Need To Know

Cybersecurity incident response begins with a proactive strategy and well-defined processes. Rapid proliferation and widespread use of Cloud computing services have given rise to an increased dependency on maintaining robust security for business continuity and supporting mission-critical operations. Incident response, which is one of the most critical domains of cybersecurity, begins with a proactive strategy

Cybersecurity Incident Response: Everything You Need To Know Read More »

healthcare cybersecurity news

8 Insightful Healthcare Cybersecurity News Articles

HIPAA compliance, Zero Trust, and the (in)security of telehealth headline this week’s Healthcare Cybersecurity news digest.  Thanks for checking out the biweekly Idenhaus Healthcare Cybersecurity news digest. We have started breaking this digest into 2 verticals – general Identity Management (published on Thursday) and Healthcare IAM and Cybersecurity. Peruse our resources for webinars, case studies,

8 Insightful Healthcare Cybersecurity News Articles Read More »

jodi-daniels-gdpr-overview-idenhaus

GDPR Overview with Jodi Daniels, Privacy Consultant

Privacy consultant Jodi Daniels provides an overview of the General Data Protection Regulation (GDPR).   GDPR is the most important change in data privacy in the past 20 years and fundamentally reshapes the way data is handled across every sector. Jodi Daniels is the founder and CEO of Red Clover Advisors, a boutique data privacy consultancy,

GDPR Overview with Jodi Daniels, Privacy Consultant Read More »

9 Must-Read Security & Identity Management Articles, June 2018

Every two weeks, we feature the latest IAM/IDM and cybersecurity industry news in the Idenhaus Identity & Access Management digest. We curate the best IAM, IoT, IGA, & Cyber Security articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are 9 informative IAM and security articles from June 2018. Enjoy! The Role of Identity

9 Must-Read Security & Identity Management Articles, June 2018 Read More »

6 Cyber Risk Insights from AIG and Axio’s Executive Risk Summit

Idenhaus recently attended AIG and Axio’s Executive Risk Summit, which brought together a panel of insurance experts to discuss Cyber Risk management. Cyber exposures are expanding rapidly as businesses move their IT systems to the cloud and adopt the Internet of Things (IoT) and Bring Your Own Device (BYOD). These changes introduce fundamental new threats to businesses of

6 Cyber Risk Insights from AIG and Axio’s Executive Risk Summit Read More »

Colossal Equifax Data Breach Is Ominous Warning for Corporations

The massive scope of the Equifax data breach is almost as horrifying as the confidential personal data that was exposed. Approximately half of the U.S. population was impacted, as well as consumers in the U.K. and Canada. The sensitivity of the data (national id, financial history, addresses, birth date, etc.) makes this breach more serious

Colossal Equifax Data Breach Is Ominous Warning for Corporations Read More »

What Is Threat Intelligence, Anyway?

This article was authored by Idenhaus’ Director of Cybersecurity, Derek Christensen. Threat Intelligence is experiencing its 15 minutes of fame as this year’s cybersecurity buzzword. It was a session topic at last month’s RSA Conference – From an Unknown Discipline to Cyber-Buzzword – and is considered a “must have” for all security analysts. Practically everyone is going on

What Is Threat Intelligence, Anyway? Read More »

Top Cybersecurity Articles Trending this Week

Here are the top cybersecurity articles from January 14-27, 2016. Signup to receive biweekly updates here.    Nine of Ten Breaches Easily Avoidable, Study Finds Nine of every ten data breaches that occurred in the first eight months of 2015 were “easily avoidable,” underscoring the need for private sector investment in tools and processes to

Top Cybersecurity Articles Trending this Week Read More »

Scroll to Top