Recent Posts by Scott Kortright

 
Scott Kortright has been a technology marketer for 20 years across a diverse set of industries and specializes in Technology Product Marketing and Sales Enablement. As Identity Automation’s Vice President of Marketing, Scott leads the company in the development, planning, and execution of strategic go-to-market, communications, and product marketing initiatives. He is an avid Syracuse Orange fan, doting father, border collie lover, and happy Blue Apron customer.

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 1

Today, institutions of higher education face a dizzying array of regulations. These regulations increasingly force colleges and universities to adopt stronger security measures as they combat more and more cybersecurity threats. Many of these regulations mandate two-factor authentication (2FA) to ensure that the right person is accessing sensitive information.

Read More

Benefits of Single Sign-On Solutions

Many of our customers implement our Identity and Access Management (IAM) platform for its identity lifecycle management capabilities. And with good reason—automating these tasks means IT no longer has to waste valuable time and resources creating and managing accounts or provisioning and deprovisioning systems and target applications.

Read More

Two-Factor Authentication (2FA) Explained: FIDO U2F

In an era of constant cyberthreats, enterprises are looking to beef up their security posture. A strategy being used by more and more companies is multi-factor authentication (MFA).

One of the most secure authentication methods is Fast Identity Online (FIDO) Universal Second Factor (U2F), an emerging universal standard for tokens with native support in platforms and browsers.

Read More

How to Address Shadow IT in Higher Ed

Does your university have a shadow IT problem? The answer is most likely yes. Higher education institutions across the country are struggling with shadow IT challenges resulting from devices, services, and software residing outside of IT’s control and/or ownership.

Read More

Addressing Cyber Security Threats in Higher Education With an Integrated Approach

With the explosion of the number of cyberthreats, higher education institutions are struggling to secure their IT infrastructures in the face of limited budgets and staff. Add to this the decentralized nature of these institutions, and you have a recipe for cyber disaster.

Read More

Cybersecurity Talent Shortage - Modern IAM to the Rescue, Part 2


In our last post, we discussed the cybersecurity talent shortage and its impact on the IT industry. The enormous gap between the industry’s needs and the actual pool of qualified employees has left many IT departments and security teams with a shortage of qualified personnel, resulting in an overwhelming workload that only exacerbates security events and data breaches.

Read More

What New Federal Regulations Mean for Student Data Management in Higher Education

At the end of 2017, the first deadline passed to comply with a new set of federal regulations that will force colleges and universities that enter into contracts with federal agencies to tighten their cybersecurity practices. The Department of Education has made it clear that it will compel universities and colleges to comply with NIST’s Special Publication 800-171, which is designed to protect the confidentiality of controlled unclassified information (CUI).

Read More

RapidIdentity is Certified for OpenID Connect

Identity Automation supports OpenID Connect (OIDC), a modern and secure authentication protocol based on OAuth 2.0 authorization framework. Our customers can now use OIDC with RapidIdentity products and services, including Single Sign-On (SSO) and Multi-Factor Authentication (MFA).

Read More

Cybersecurity Talent Shortage - Modern IAM to the Rescue

The IT industry is facing an enormous problem: there’s a skills shortage of cybersecurity talent. Forty-five percent of organizations report a “problematic shortage” of cybersecurity skills—more than any other area of IT. The problem is so bad that the cybersecurity workforce gap is on pace to hit 1.8 million by 2022, a 20% increase from 2015.

Read More

Identity Management Best Practices: Addressing Password Policy Misconceptions

Passwords are widely recognized as one of the weakest links in an organization’s security. In fact, 81 percent of hacking-related data breaches last year were the result of weak, default, or stolen passwords, according to Verizon’s 2017 Data Breach Investigations report.

Read More

Subscribe Here!