Identity Automation Blog

Stay up to date with all of the latest news and events.

According to the new 2016 Verizon Data Breach Investigations Report (DBIR), legitimate user credentials were used in most data breaches, with some 63 percent of them using weak, default, or stolen passwords. This may come as some surprise to businesses that are not yet victims of such breaches as they continue to utilize homegrown, piecemeal, or legacy identity access management (IAM) solutions. While your CIO is focused on perimeter defense, your challenge is to shift this focus to the need for a more robust, modern, and integrated IAM solution, which is easier said than done.

In my recent post, I discussed how in today’s world, identity is ubiquitous – it reaches into almost everything we touch, while identity theft and fraud have become near constant topics in the news.

Recently, our CEO, James Litton sat down with the South Texas chapter of ISSA as part of the organization's podcast series on cybersecurity. Their conversation covered a wide range of security and identity and access management (IAM) topics, including identity and the Internet of Things, the future of passwords, contingent workers, IAM and the cloud, and much more.

Yes, this post’s title is a little dramatic. Chalk it up to my excitement for next month’s release of the latest Star Wars installment, Star Wars Episode VII: The Force Awakens. Revenge of the Rogues seemed way too dramatic and not at all accurate (little bit of trivia for you, Revenge of the Jedi was the original planned name for Star Wars Episode VI) and The Rogues Strikes Back is probably even worse. 

Last month I wrote an article for Entrepreneur.com titled Identify and Stop Rogue Employees Before They Become a Security Threat. The article focused on the rogue employees we detailed in our eBook, The 3 Types of Rogue Employees - and How to Stop Them - the innovative, the bad and the lazy.

At the end of April we published a couple piecesof content focused on rogue employees, a security threat facing nearly every company in the world. Rogue employees are those fully vetted users inside your company who probably have no malicious intent to cause harm, but end up doing so regardless, for a variety of reasons ranging from laziness to oversights to hoarding access.

Last week, Steven Norton published a blog post to The Wall Street Journal’s CIO Journal about increases in ‘next-gen’ security spending. It was a good post highlighting something that I think most people are aware of - enterprise security threats are very real and more and more enterprises are putting technologies and processes in place to prevent them.

Today I read an article in NetworkWorld entitled “BYOD early adopters cite sticker shock”. I have discussed BYOD with many of our customers and, personally, I can’t buy into it. To explain, here is my take on BYOD, the good, the bad and the ugly.