CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation: CVE-2026-34197
"This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise."
Posts by Idenhaus
AI has transformed email security into a full-scale arms race.
On one side, attackers use AI to produce phishing emails that are faster, cheaper, and more convincing than ever before. On the other hand, defenders use AI-native tools to detect, analyze, and respond to threats at equal speed.
Central to preparation is gaining a complete understanding of the data subject to CMMC 2.0 controls. Many organizations are still struggling to define the full scope of systems, workflows and third-party relationships that process or store CUI.
Modern enterprise IAM is shifting to govern AI agents as first-class identities, distinct from service accounts. Our expert explains how to make the switch.
America’s biggest banks are reportedly beginning in-house tests of Anthropic’s Mythos artificial intelligence model.
Biometric digital identity platform CLEAR1 is now listed in the FedRAMP Marketplace, with Clear announcing the Federal Risk and Authorization Management Program has granted it “In Process” designation at the Moderate impact level.
The UK’s professional body for the cybersecurity sector has launched a new title designed to support more people at the start of their careers in the industry.
Federated unlearning promises that user data can be removed from a trained AI system. But what if the request to forget is not itself trustworthy? Research shows that while FU appears to be a natural extension of data rights, it also introduces new hidden security risks.
As cybercrime becomes a structured extortion economy, negotiation relies on intelligence, psychology, and insider knowledge of hacker tactics — not just technical skill.
New alert from the Social Security Administration: If you receive an email claiming to be from SSA, pause and review it carefully:
- Is it creating urgency or threatening consequences?
- Is it asking for personal or financial information?
If the answer is yes, treat it as a scam.
Attackers are actively exploiting internet-connected OT devices—including Rockwell Automation & Allen-Bradley PLCs—across multiple critical infrastructure sectors. Since March, this activity has caused disruptions by tampering with project files and altering data presented on HMI and SCADA displays.
In an age of AI, consumers should have access to tools that let them search for apps that align with their privacy preferences. But even if the privacy labels are perfectly accurate, nobody wants to spend all day reading them - short and sweet is the ideal.
Preparing for a CMMC assessment takes more than a checklist and a project plan. At Idenhaus, we help contractors turn CMMC requirements into a disciplined, cross-functional program—so you can reach certification on time and with confidence.
Dave Silke from Centripetal explains why 2026 demands a new emotional intelligence when it comes to bolstering a business’s cyber defense. #cybersecurity
The question isn’t whether Google reads your emails — it’s whether you’re comfortable with how that data is being used and whether your current settings reflect your actual preferences.
When someone tells you they are required to do something under HIPAA, they are usually wrong. And when they tell you they are not permitted to do something under HIPAA, they are usually wrong. The best advice regarding HIPAA is usually: “I don't think that word means what you think it means.”
Ledger’s Charles Guillemet says artificial intelligence is making hacks cheaper and faster, forcing a rethink of how crypto systems stay secure.
Check Point Email Security now expands Microsoft Teams protection to organizations without advanced Microsoft E5 licensing.
The healthcare landscape is undergoing a significant transformation with the upcoming rewrite of the HIPAA Security Rule in 2026. For practice managers and healthcare administrators, understanding these changes is crucial to maintaining compliance and protecting patient data. Let's dig in!
More than 250 AI-related bills have been introduced across 47 states as policymakers attempt to establish oversight for emerging clinical technologies.
When asked which capabilities would most improve their organizations’ ability to safely scale AI agents, 52% selected real-time visibility into agent actions. Forty-five percent selected clear identity separation between AI agents and humans.
“The organizations succeeding in 2026 are those giving stakeholders meaningful solution choice while maintaining robust security.”
A recent statewide technology summit convened hundreds of court professionals from around the state to talk about cybersecurity and how using artificial intelligence (AI) data can improve efficiency and benefit court users.
Security leaders must understand that the underlying principle of zero trust identity management is “never trust, always verify.” In 2026, this approach will not only secure enterprise environments but also reshape how organizations think about authentication, access control, and risk management.
The UAE Cybersecurity Council has warned of rising risks linked to remote working, noting that the shift has driven an increase in attacks targeting unsecured home routers. These vulnerabilities potentially expose the data of individuals, institutions, and businesses to breaches.
Achieving true cyber resilience is an all-hands endeavor. It requires a health care organization to take a holistic approach that sets clear recovery priorities, drives cross-functional coordination, rigorously tests response plans, and ensures vendors meet core resilience expectations.
At HIMSS26, representatives from healthcare coalitions discussed how small and rural hospitals can collaborate to strengthen their defenses, build resilience, and protect their facilities by engaging leadership within their organizations to drive change.
Free cybersecurity training can help water and wastewater utilities protect themselves against hackers, but only when paired with hands-on assistance and incentives for employees to build cybersecurity skills, Microsoft said in a report published on Thursday.
HIPAA compliance is no longer just a regulatory requirement—it is a fundamental component of protecting patient trust and healthcare data security. As cyber threats increase and federal enforcement becomes more aggressive, healthcare organizations must stay informed and prepared.