Access management

Attack Surface Management

Attack Surface Management   Do you have 100% of your organization’s attack surface inventoried? No, seriously. Do you know every device that’s logging into your network, including who it is, and when? Have you checked every proverbial door, window… basement, attic, heck, every nook and cranny? I would argue: probably not. In today’s environment, especially […]

Attack Surface Management Read More »

Data Quality Issues – How They Affect Security & Your Bottom Line

by Leah Livingston Last week, we brought to light some data quality issues that are affecting all aspects of the organization. You probably asked yourself, “Wait, our poor data quality is affecting our security posture, as well as our profit margin?” The short answer is, absolutely. Remember our examples? It’s not just slow onboarding or

Data Quality Issues – How They Affect Security & Your Bottom Line Read More »

Atlanta Business RadioX Interview with Idenhaus’ Hanno Ekdahl

The last two years have been tumultuous for many organizations, and we have seen an explosion in demand for cybersecurity and Identity and Access Management solutions to help them adapt. Organizations are more reliant now than ever before on their IT systems to keep up with their clients, partners, and employees. Because the demand was

Atlanta Business RadioX Interview with Idenhaus’ Hanno Ekdahl Read More »

Reasons to be Thankful for Cybersecurity, Part Two

In this edition of our newsletter, we’re highlighting the good that comes from cybersecurity, especially from the proactive approach of zero trust. We’re thankful for cybersecurity, both when it works and when it’s being worked on. Less thankful for the malware and threat actors out there, but with the right cyber security plan in place,

Reasons to be Thankful for Cybersecurity, Part Two Read More »

5 Must-Have Cyber Security Policies for your Organization

5 Must-Have Cyber Security Policies for your Organization, by Sajid Shafique One of the most essential factors in maintaining a good security posture for an organization is setting forth the expectation of what is allowed and what is not. Any action that the organization might take, ranging from implementing technical controls like setting up a

5 Must-Have Cyber Security Policies for your Organization Read More »

Scroll to Top