Today we announced RapidIdentity 3.5, the latest generation of our identity and access management solution. In making that announcement, we’re also revealing our vision for multi-factor authentication.
Today we announced RapidIdentity 3.5, the latest generation of our identity and access management solution. In making that announcement, we’re also revealing our vision for multi-factor authentication.
The new school year has begun and so have the challenges that come with managing thousands of student accounts. Recently, we saw an article about one school district in Tennessee that experienced the chaos of manual identity management first hand when they attempted to deploy their iPads for Kids Program.
During every school year, faculty members resign, students graduate and staff are terminated. However, when a student or an employee leaves the school, who makes sure their accounts are deactivated and deleted?
News of a school district grappling with the security pitfalls of access management made headlines recently and it caught our eye. According to ZDNet, when Bearden Middle School in Knoxville, Tennessee issued new iPads to their students as part of the national iPads for Kids Program, they had few options at their disposal for securing them.
To say that the Internet of Things (IoT) has been a hot topic lately would be an understatement. Over the last few years, talk about IoT has rocketed from zero to a hundred, and has created a growing number of eager early adopters who want to take shiny, new IoT devices home with them right now. At the same time, some businesses have already started dipping their toes into the IoT lake. However, like many technologies ahead of their time, the increase in the number of IoT devices is quickly outpaced by the number of ways they can be breached by cyber criminals.
First off, what is an Orphan account?
Orphan accounts are the accounts that have somehow slipped past the de-provisioning paper trail. Those accounts that still have organizational access to systems without a valid owner.
I recently presented at the 2nd Annual ISACA Cybersecurity Conference in Houston, TX, held by the Information Systems Audit and Control Association (ISACA), a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance. Other presenters revealed some new, interesting ways to protect organizations from security threats, and as always, conversations other attendees proved enlightening. This year, they gave me some insight into reasons why people don’t have more effective security systems.
Most college students use technology on a daily (if not hourly basis), and view it as an essential tool. Students use technology to complete a variety of tasks, especially in relation to coursework, such as research and turning in homework. Modern students expect their school’s technology to integrate seamlessly into their lives and make the learning experience easier. And that’s just the average college student; budding engineers and technological geniuses expect their college to provide them with up-to-date hardware and software solutions.
In the first two installments of our Correlation Mini-Series, we talked about Identity Correlation and Event Correlation. In our final installment, today we address a new type of correlation called Behavioral Correlation.
Yesterday, we kicked off our Correlation Mini-Series by discussing Identity Correlation. Today, In the second installment of that mini-series, we’ll discuss what we see as the second most frequent type of correlation we run into, event correlation.
current_page_num+2: 40 -