Recent Posts by Kathleen Garska

 
Kathleen Garska is an experienced digital marketer and writer within the B2B and technology spaces. As Identity Automation’s Marketing Manager, she oversees the company’s digital, social, event, and blogging efforts. Beyond Marketing, her interests include art, design, travel, and cooking.

CJIS Compliance and Your Information Security Program

The role of mobile technologies within the field of law enforcement continues to grow in both importance and number of applications. Law officers count on these technologies for much more than simply receiving dispatch calls or looking up arrest records. Officers are using mobile devices in the field for capturing photo evidence, fingerprinting suspects at the scene, conducting interviews, issuing tickets and citations, managing personnel tracking and deployment, and much more.

Read More

The Problem with Legacy IAM Systems and Third-Party Access

Despite the risks associated with remote third-party access and the ongoing slew of data breaches resulting from third-party breaches, outsourcing isn’t going away anytime soon. On the contrary, IT outsourcing will be a $335 billion industry by 2019, according to Gartner. The benefits to business productivity, efficiency, and collaboration are simply too great, and modern enterprises can’t compete without opening up their infrastructures and data.

Read More

IAM Considerations When Planning an AWS Migration

As with any technology shift, there are many considerations and concerns surrounding a migration to the cloud, like how your existing software licenses transfer, what type of “cloud” you might need, reliability, and as always, security.

Read More

Why You Need to Rethink Your Employee Access

Breaches caused by outside hackers get the most press. For example, the recent Equifax breach that resulted in the release of confidential data on 143 million Americans was carried out by external hackers who may have been state sponsored. The breach resulted in Equifax’s chief executive officer, chief information officer, and chief security officer all losing their jobs. 

Read More

Cyber Attackers Are Increasingly Targeting Organizations Through Third Party Acces


What do Home Depot, Target, Jimmy John’s, Wendy’s, Scottrade, Gmail, and the National 
Security Agency have in common? Each has suffered a high-profile data breach related to third-party access in the past five years. It’s clear: Many organizations, across industries, are failing to put the necessary security measures in place to prevent or minimize the identity and access risks associated with third-party access.

Read More

Why IAM Should Be a Foundation for Your AWS Migration

As cloud technologies and services become increasingly pervasive, accepted, and economically compelling, it’s no longer a matter of “if”, but when to migrate. However, an equally important question is how to migrate! And more and more, companies are moving some or all of their infrastructure to Amazon Web Services (AWS) in order to realize lower capital costs and total cost of ownership, elastic scalability, and high availability at a global scale.

Read More

Our Top IAM Blog Posts for Education in 2017

Last week, we released our top five most popular Enterprise IAM Blogs from 2017. This week, we want to take a look back at some of our favorite higher education and K12 education-related content. From ransomware, to managing transient users, to student data privacy, we’ve covered a wide range of key topics in the industry.

Read More

Our Top Enterprise IAM Blogs in 2017


Another year, another look back at our top blogs! 2017 produced our our most read blog to-date, RBAC vs ABAC Access Control Models - IAM Explained. And from common Multi-Factor Authentication (MFA) terms and factor types to the top challenges and benefits, we also saw great readership on many of our MFA-related articles.

Read More

New RapidIdentity Product Capabilities Released in Fall 2017


At Identity Automation, we are continuously releasing new product capabilities for our RapidIdentity Identity and Access Management (IAM) solution. We’ve had a few releases this fall and wanted to make our customers aware of key capabilities that have been released over the past several months.

 

Read More

The Inherent Risks of Remote Third-Party Access

Businesses today are increasingly reliant on third parties, such as contractors, contingent workers, and vendors. And while these third parties enable organizations to decrease operational costs and increase productivity and agility, it also means greater numbers of external users need remote access to internal networks and sensitive corporate resources and data.

Read More

Subscribe Here!