Recent Posts by Scott Kortright

 
Scott Kortright has been a technology marketer for 20 years across a diverse set of industries and specializes in Technology Product Marketing and Sales Enablement. As Identity Automation’s Vice President of Marketing, Scott leads the company in the development, planning, and execution of strategic go-to-market, communications, and product marketing initiatives. He is an avid Syracuse Orange fan, doting father, border collie lover, and happy Blue Apron customer.

Identity Automation and Adnet Announce Strategic Partnership

Strategic Alignment Poised to Deliver Comprehensive Identity and Access Management Platform to Oceania Region

Sydney, Australia, January 28, 2019 ⎯ Identity Automation, leading provider of Identity and Access Management (IAM) solutions, and Adnet Technology Australia, IT procurement and services delivery provider within the Oceanic region, today announced their strategic partnership to support organizations in the Oceania region.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 3

Another year, another series of data breach headlines. 2018 has come to a close, and we’ve been looking back at one of the year’s biggest and potentially costliest breaches: the British Airways data breach that was announced back in September. With approximately 380,000 booking transactions exposed and more than $1 billion in potential fines and lawsuits, the breach offers many important lessons.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 2

The recent British Airways breach is only one of many recent breach headlines, but it got us thinking about the importance of getting security basics right. All too often, the biggest breach headlines—and the ones with the largest financial and reputational impact—are the result of minor and preventable security vulnerabilities.

Hackers continue to use the same tried and tested techniques because they know that, all too often, companies aren't putting enough time and effort into basic security measures.

Read More

Is Your District Keeping Up with 2018's Top EdTech Trends? If Not, Here's How IAM Can Help, Part 3

Remember the three Rs (reading, writing, and arithmetic)? They’ve been joined by the four Cs: collaboration, creativity, critical thinking, and communication, thanks to growing usage of technology in the classroom.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 1

On September 7, 2018, British Airways disclosed that a data breach had impacted customer information taken from approximately 380,000 booking transactions conducted between August 21 and September 5, 2018.

Although the attack wasn’t elaborate, it was effective. A cyber attacker installed malware on British Airways’ website using a known security vulnerability to introduce malicious code that altered the behavior of the booking website—without penetrating the network or servers in a way that could trigger additional alerts.

Read More

Is Your District Keeping Up with 2018's Top EdTech Trends? If Not, Here's How IAM Can Help, Part 2


In part one of our series on EdTech trends, we looked at the top three trends in 2018 and what they mean for schools. These trends—data-driven instruction, using technology to equip students with 21st century skills, and Google’s dominance in the classroom—all have the power to transform the way today’s students learn and perform.

Read More

Is Your District Keeping Up with 2018's Top EdTech Trends? If Not, Here's How IAM Can Help, Part 1

Step into a classroom today, and you’ll see the familiar bulletin boards, desks, and chairs that you remember from your childhood. You’ll also see some newer additions—tablets, Chromebooks, and big touch screens. The use of technology in the classroom is rising, and there are distinct trends emerging as a result.

Read More

The Zero Trust Model - What It is and Why It Starts with Identity

The digital transformation has significantly increased risk exposure for enterprises. With users operating a variety of devices from a variety of locations, there is a greater attack surface with less IT oversight and control.

Read More

Alternative Authentication for Students, Part 2 - Pictograph Authentication


Technology in the classroom creates usability issues for very young students in pre-k, kindergarten, and first grade, as well as special education students. For many of these students, remembering and typing even simple usernames and traditional passwords is a struggle.

Read More

Alternative Authentication for Students, Part 1 - QR Code Badges



Schools are integrating technology and cloud resources into the classroom with ever-growing frequency. Overall education technology spending is expected to reach $19 billion by 2019 on a global scale. It’s easy to see why: Technology in the classroom has the ability to increase collaboration and productivity, create a more personalized learning experience, and enable teachers to distribute assignments and provide real-time feedback.

Read More

Subscribe Here!