Tag Archives: data breach

Reducing Your Legal Exposure After a Cybersecurity Incident

How can your organization reduce its legal exposure immediately following a data breach? Cybersecurity events like data breaches make headlines regularly and cost businesses millions in fines and lawsuits. Breach announcements topple executives, destroy shareholder confidence, push customers away, invite …Read More


Finding Balance in Data Privacy

Is it possible to find a good balance between supporting businesses vs. protecting consumers’ sensitive data? We think so. While the regulatory environment has lagged the rapidly changing world we live in, consumer behavior is adapting as the average person …Read More


10 Must-Read Identity Management & Data Breach Articles, September 2017

Stay informed by receiving our biweekly Identity Management & Cybersecurity digest in your inbox. We curate high quality and relevant IAM & Cybersecurity articles to help you navigate the ever-changing IT landscape. Subscribe to our biweekly newsletter here. Here are the top Cybersecurity and Access …Read More


7 Must-Read Identity Management & Cybersecurity Articles, June 2016

Check out the Idenhaus biweekly roundup featuring Japan’s new focus on critical infrastructure cybersecurity, industrial control vulnerabilities that can’t be patched, and the top five cybercrime trends from Mikko Hypponen. Get this biweekly update delivered a day earlier by signing up …Read More


Top Cybersecurity Articles Trending this Week

Here are the top cybersecurity articles from January 14-27, 2016. Signup to receive biweekly updates here.    Phishing Attacks: What Can Be Done To Stop Staff From Causing a Data Breach? A recent report by the Ponemon Institute puts the …Read More


6 Must-Read Cybersecurity Articles, January 2016

Here are the must-read Cybersecurity, Infosec, and Identity Management articles from January 1 – 13, 2016. You can sign up for our biweekly newsletter here.   Researchers Out Default Passwords Packaged With ICS/SCADA Wares Information was gathered on more than 100 products using default passwords …Read More