Identity Automation Blog

Passwordless Authentication

Passwords are one of the most confusing concepts in secure authentication for typical users.

Read More

What is ITDR (Identity Threat Detection Response)

The past couple of decades have seen an immense evolution in the cyber threat landscape and how organizations and enterprises utilize IT. Threat actors develop new cyber exploitation techniques, and concurrently cybersecurity solution vendors develop new technologies and methodologies. Those new technologies and methodologies often get branded with a new acronym that soon became part of the vernacular of SOC analysts everywhere.

Read More

QR Codes are an Emerging Cyberattack Vector

 

It’s 2023, and QR codes have been ubiquitous for well over a decade now.

Read More

Protecting Your Institution from the Threat of Spear Phishing

Stop-Threats-Real-Time

Spear phishing is one of the most potentially destructive types of cyberattacks ever.

Read More

The Evolution of Technology and the Power of IAM

  ISTE header (1)
 
 
My very first trip to a national technology conference was in 2005 when I attended NEC (now known as ISTE) in Philadelphia. I was invited to attend by Discovery Education because I was one of three winners of their “Win a Wireless Laptop” contest. They paid for my airfare and booked me at the Marriott Old City, where my love for the national technology conference, ISTE, was born.
 
 
Read More

Why Zero Trust Is the Foundation of a Strong K-12 Cybersecurity Program

While technology has created boundless new opportunities for learning, it has also produced ever-growing data security challenges. In years past, cyber defensive strategies were confined to internal environments.

Read More

White House Warns of Imminent Cyber-Risk: Tech Giants Immediately Confirm Breaches

On Monday (3/21/22), the White House released a statement by President Biden on our Nation’s Cybersecurity warning that “based on evolving intelligence” U.S. companies and organizations need to urgently harden their cybersecurity defenses against potentially imminent cyberattacks.

Read More

Why Your Institution's Community is the Greatest Ransomware Threat

Cybersecurity experts have long touted that “the traditional perimeter is dead” and have advocated for a zero-trust and identity-centric approach to security. However, if your identities are the most important element of a modern cybersecurity program, it is an unfortunate, but real truth that they are also the biggest threat to your systems.

Read More

New Research: K-12 Districts Must Face the Mounting Cybersecurity Challenges

Due to the COVID-19 pandemic, many K-12 educational institutions are using remote or hybrid learning models. This growing digital footprint has created a prime opportunity for malicious actors to take advantage of districts’ increased reliance on digital tools. 

Read More

M&A Integration: The Top Four Identity Management Challenges

*Disclaimer: This article originally appeared on Forbes.

In recent years, mergers and acquisitions have seen a record number of transactions and continue to draw staggering figures. According to a recent IMAA report, 2018 saw about 49,000 global M&As with a combined enterprise value of $3.8 trillion. This year is projected to have similar or greater numbers.

Read More

Subscribe Here!