Recent Posts by Tim Everson

 
Tim Everson currently serves as the Information Security Engineer at Identity Automation and is a recognized expert in the realm of identity and information security, having over 20 years of experience delivering and supporting technology solutions throughout every sector of the industry. Holding multiple certifications from leading security vendors, he strives to 'give back' his knowledge to the community through reviews of security products, courseware, books, and other subject matter, while remaining involved in the open source and security communities through membership in such organizations as FBI Infragard. When not tucked behind a computer screen, he enjoys sport motorcycles, computer graphics and animation, and hiking/outdoor activity with his family.

How RapidIdentity Protects Student Data & the EFF’s “Spying on Students” Report

Within every market—whether it be government, business, healthcare or education—it’s crucial that identity and access management (IAM) solutions are designed and implemented with close adherence to the latest government, regulatory, and best practice security frameworks and laws, in order to help organizations meet their compliance goals and to ensure the integrity and security of their user data.

Read More

Starting, Stopping and Managing AWS Instances: Managing Infrastructure with RapidIdentity, Part VI

As more and more organizations realize the benefits of “cloud computing," the demand to host applications and services in the cloud continues to rise. Identity Automation and many of our customers have moved significant workloads into Amazon Web Services (AWS) or other cloud-hosted environments, and as a result, the need to automate and manage tasks in these environments has become more commonplace.

Amazon has provided management API’s to accommodate these needs and RapidIdentity allows customers to use them, in order to provide the same automation and “ease of use” in managing their cloud resources that they have come to rely upon for their day-to-day, on-premise IT processes.

Read More

Phishing Campaigns Require a Proactive Approach to Security

Intruders Thrive on Complacency

When it comes to the threat landscape, nothing makes information security teams shudder more than complacent users, whether they be employees, partners, vendors, or customers. Yearly security and awareness trainings have become all the rage (rightly so), helping to check off boxes on company compliance audits. However, all too often, new users or even seasoned veterans can be caught off-guard and open the door to evildoers.  

Read More

Performing OpenVAS Vulnerability Scans: Managing Infrastructure with RapidIdentity, Part 5

In today’s digital world, information security has quickly become one of the foremost areas of concern for individuals and businesses alike. Particularly in the business realm, government regulations, such as the Payment Card Industry Data Security Standard (PCI DSS) and the Health Insurance Portability and Accountability Act (HIPAA), require close security auditing and penetration testing in order to ensure consumer, patient, and business data are handled securely (i.e. storage, retrieval, transmission, and authorized access).

Read More

Managing Infrastructure with RapidIdentity Part 4: Checking the Status of RapidIdentity Password Filter Installations on DC’s


Today, I want to look at one of the ways that RapidIdentity allows administrators to automate tedious and cumbersome tasks. I’ll demonstrate a way to analyze Windows domain controllers for the presence of a specific software installation and also provide the entire RapidConnect action at the end of the post, so that you can modify it to fit your needs.

Read More

Compliance Must Become More than Earning a “Participation Trophy”



One of the most concerning trends for 2016 seems to be "Another day, 
another healthcare data breach." Breaches are becoming an all too regular occurrence and not just among healthcare providers. Retailerscredit and financial institutionsentertainment giants, and even governmental agencies are falling prey to the hackers, and in many cases are allowing access to very private customer data, at an alarming rate.

Read More

Managing Infrastructure with RapidIdentity Part 3: Managing Windows Hosts

Recently, one of our RapidIdentity customers ran into a conundrum. While the customer heavily uses RapidConnect to synchronize their various application and authentication identity sources, they awoke to a mass Email stating that during their morning provisioning the displayName attribute on every user in their environment was changing!

Read More

Managing Infrastructure with RapidIdentity Part 2: Managing Linux Hosts

Information technology teams tend to have a lot on their plate in terms of installing, maintaining, and protecting various systems throughout the enterprise. The larger the environment, the darker the cloud that tends to loom overhead when it comes to managing even trivial tasks, such as installing management agents or antivirus and keeping them up-to-date. Typically, this is due to the fact that there simply aren’t enough hands on the team, nor hours in the day, to touch dozens or hundreds of machines in disparate datacenters.

Read More

Managing Infrastructure with RapidIdentity Part 1: The Basics


At Identity Automation, we focus on providing solutions to meet a wide variety of our customers’ needs. As our name implies, “Automation” is an important aspect of our belief that consistent, repeatable activities are key to any successful IT endeavor. Our RapidIdentity product set allows our customers to follow in that mindset and to build, test, and deploy highly
tailored and effective management tools quickly, efficiently, and creatively. This all helps to minimize an organization’s staff efforts, while maximizing productivity.

Read More

The Value of Identity Part 3: Five Steps to Avoid a Breach



In Part 1 and Part 2 of my series on the value of identity, we looked at the consequences of revealing excessive personal information in public, more specifically the digital realm, can have on the individual and an organization. We saw that hackers can use the information you reveal on social media and the internet not only to impersonate and steal your identity, but to even infiltrate and take control of your company’s network. 

Read More

Subscribe Here!