Recent Posts by Scott Kortright

 
Scott Kortright has been a technology marketer for 20 years across a diverse set of industries and specializes in Technology Product Marketing and Sales Enablement. As Identity Automation’s Vice President of Marketing, Scott leads the company in the development, planning, and execution of strategic go-to-market, communications, and product marketing initiatives. He is an avid Syracuse Orange fan, doting father, border collie lover, and happy Blue Apron customer.

Buying Identity Management: Single-Vendor Platform vs Multi-Vendor Point Products—Part 1

There can be no doubt that cybersecurity threats are real and increasing in volume and complexity. Not taking a proactive stance puts your organization at high risk for a breach. According to the Verizon 2017 Data Breach Investigations Report, 62 percent of data breaches last year were the result of hacking. Of those hacking-related breaches, 81 percent were caused by stolen or compromised credentials.

Read More

How to Overcome the Security Hate Factor when Implementing MFA

While best practice security policies and technology help to better secure an enterprise’s critical systems and data,  the added disruption, inconvenience, and effort required by this stepped-up security often create real headaches and bad feelings toward the new policies and technologies.

This is described as a “general hatred of security,” by Mike Pinch, the chief information security officer at University of Rochester Medical Center (URMC), in a presentation to the URMC Security Council.

Read More

Doxware: A Ransomware Strain Coming Soon to a System Near You

Ransomware, which encrypts data on a victim’s machine and then demands payment of a ransom (usually in bitcoins) to decrypt the data, is running rampant in cyberspace. In fact, ransomware attacks increased more than 600 percent last year compared to 2015. Here’s another frightening statistic: There is a ransomware attack on a company every 40 seconds.

Read More

University Security: Implications of BYOD Policies - Part 2

Bring-your-own-device (BYOD) policies are now a necessity for universities and colleges across the country. In Part 1 of this series, we covered the positives and negatives of BYOD, as well as the security implications of such policies. In this post, we’ll go over how to easily implement secure BYOD using a modern identity and access management (IAM) platform.

Read More

University Security: Implications of BYOD Policies - Part 1

Bring your own device, or BYOD, is a fast-growing trend on higher-education campuses across the country. In fact, at least 42 percent of U.S. colleges and universities have implemented a BYOD strategy. Meanwhile, bandwidth on campuses has nearly tripled since 2012, with more than 70 percent of schools offering at least 1 GB, in part because of the need to keep up with BYOD demand.

Read More

How to Prepare for the DFARS Compliance Deadline: Part 2




As discussed in our previous blog post, the December 31 deadline for complying with data security requirements in the Defense Federal Acquisition Regulation Supplement (DFARS) is looming.

Read More

How to Prepare for the DFARS Compliance Deadline: Part 1

If you do business with the Department of Defense (DoD), get ready! After a two-year extension, the deadline for complying with the Defense Federal Acquisition Regulation Supplement (DFARS) data security requirements is fast approaching—December 31 of this year.

Read More

Why You Need to Immediately Cut Data Access When Employees Leave



When your company parts ways with employees, are you able to immediately terminate all access to corporate data? If not, you’re opening the organization up to a very real danger.

Read More

Privileged Access Management vs. Privileged User Management

The majority of major data breaches in recent years have resulted from hackers gaining access to unmanaged and unprotected privileged accounts and credentials.

Read More

Why SMS 2-Step Verification Won’t Keep You Safe

If you’re active with any online service, then you have probably gone through the process of SMS two-step verification, in which a company or app texts a one-time code to your phone as a way to verify you are who you say you are in order to access the service or reset a password. But have you ever stopped to consider how secure this method truly is?

Read More

Subscribe Here!