Identity Automation Blog

Recent Posts by Kathleen Garska

 
Kathleen Garska, Identity Automation's Director of Marketing, is an experienced digital marketer and marketing communications specialist within the B2B and technology spaces. With a decade of professional writing and editing experience, Kathleen heads Identity Automation's marketing department, managing the strategic direction of the company's blog, website, content resources, digital marketing and demand generation efforts. Beyond Marketing, Kathleen is a dedicated (see: obsessed) dog mom to two rotten terriers, and she loves art, travel, cooking, yoga, and cycling.

Addressing Cyber Security Threats in Higher Education With an Integrated Approach

With the explosion of the number of cyberthreats, higher education institutions are struggling to secure their IT infrastructures in the face of limited budgets and staff. Add to this the decentralized nature of these institutions, and you have a recipe for cyber disaster.

Read More

The 6 Business Systems You Should Be Protecting with Privileged Access Management, Part 1

Traditionally, privileged accounts are IT-based and have special active directory (AD) attributes. IT administrators use them to log into servers, switches, routers, and applications and perform tasks without restriction.

Legacy security systems focus on protecting these AD privileged accounts, and with good reason: Once obtained by hackers, the accounts can be used to access the most sensitive data, lock out legitimate users, and create ghost accounts and back doors that are not easily seen.

Read More

Cybersecurity Talent Shortage - Modern IAM to the Rescue, Part 2


In our last post, we discussed the cybersecurity talent shortage and its impact on the IT industry. The enormous gap between the industry’s needs and the actual pool of qualified employees has left many IT departments and security teams with a shortage of qualified personnel, resulting in an overwhelming workload that only exacerbates security events and data breaches.

Read More

Cloud Computing for Schools: How IAM Systems Can Improve Migration

If you are thinking of moving to the cloud or have already started that transition, you’re in good company. An impressive 80 percent of school districts are using cloud-based software. It’s easy to see why.

The cloud offers many benefits for students, educators, and administrators. Students are able to learn technology skills, collaborate with other students, hold group discussions online, and get valuable information from outside experts.

Read More

Privileged Account Management is More Than Just Protecting IT Admin Accounts

There have been a slew of major data breaches in recent years. The number of records exposed in data breaches last year alone reached 174.4 million—close to five times the 36.6 million records exposed in 2016, according to the Identity Theft Resource Center.

Read More

What New Federal Regulations Mean for Student Data Management in Higher Education

At the end of 2017, the first deadline passed to comply with a new set of federal regulations that will force colleges and universities that enter into contracts with federal agencies to tighten their cybersecurity practices. The Department of Education has made it clear that it will compel universities and colleges to comply with NIST’s Special Publication 800-171, which is designed to protect the confidentiality of controlled unclassified information (CUI).

Read More

RapidIdentity is Certified for OpenID Connect

Identity Automation supports OpenID Connect (OIDC), a modern and secure authentication protocol based on OAuth 2.0 authorization framework. Our customers can now use OIDC with RapidIdentity products and services, including Single Sign-On (SSO) and Multi-Factor Authentication (MFA).

Read More

Cybersecurity Talent Shortage - Modern IAM to the Rescue

The IT industry is facing an enormous problem: there’s a skills shortage of cybersecurity talent. Forty-five percent of organizations report a “problematic shortage” of cybersecurity skills—more than any other area of IT. The problem is so bad that the cybersecurity workforce gap is on pace to hit 1.8 million by 2022, a 20% increase from 2015.

Read More

Identity Management Best Practices: Addressing Password Policy Misconceptions

Passwords are widely recognized as one of the weakest links in an organization’s security. In fact, 81 percent of hacking-related data breaches last year were the result of weak, default, or stolen passwords, according to Verizon’s 2017 Data Breach Investigations report.

Read More

CJIS Compliance and Your Information Security Program

The role of mobile technologies within the field of law enforcement continues to grow in both importance and number of applications. Law officers count on these technologies for much more than simply receiving dispatch calls or looking up arrest records. Officers are using mobile devices in the field for capturing photo evidence, fingerprinting suspects at the scene, conducting interviews, issuing tickets and citations, managing personnel tracking and deployment, and much more.

Read More

Subscribe Here!