IAM

Attack Surface Management

Attack Surface Management   Do you have 100% of your organization’s attack surface inventoried? No, seriously. Do you know every device that’s logging into your network, including who it is, and when? Have you checked every proverbial door, window… basement, attic, heck, every nook and cranny? I would argue: probably not. In today’s environment, especially […]

Attack Surface Management Read More »

Data Quality Issues – How They Affect Security & Your Bottom Line

by Leah Livingston Last week, we brought to light some data quality issues that are affecting all aspects of the organization. You probably asked yourself, “Wait, our poor data quality is affecting our security posture, as well as our profit margin?” The short answer is, absolutely. Remember our examples? It’s not just slow onboarding or

Data Quality Issues – How They Affect Security & Your Bottom Line Read More »

Data Quality – Why You Can’t Ignore It Any Longer

  by Leah Livingston Managing your organization’s data can seem like a daunting task, especially after years of piecemeal processes, applications and add-ons have compounded upon one another. Once in this type of situation, getting your “house in order” can seem overwhelming and nearly impossible. However, just like the foundation of your home, ignoring that

Data Quality – Why You Can’t Ignore It Any Longer Read More »

Security Priorities, Zero Trust (Again!) and Employee or Insider: Cybersecurity News for May

If April brings cybersecurity showers, does that mean that May would bring cybersecurity flowers? At Idenhaus, we think so! The good news is that while the numbers are staying fairly steady as far as breaches, the amount of cybersecurity planning and ramp-up we are seeing is very promising. The government is looking to help those

Security Priorities, Zero Trust (Again!) and Employee or Insider: Cybersecurity News for May Read More »

6 Common Identity Challenges That Can Be Addressed In An IAM Strategy

6 Common Identity Challenges That Can Be Addressed in an IAM Strategy Written by Hanno Ekdahl  When it comes to Idenhaus, you would be right to assume that we take cybersecurity and identity management seriously. We like to think of Identity and Access Management as more than just a way to keep an organization secure,

6 Common Identity Challenges That Can Be Addressed In An IAM Strategy Read More »

Scroll to Top