Why Legacy, Homegrown, and Open-Source IAM Systems Can't Address Higher Education's Identity Management Challenges

While higher education institutions face many of the same identity and access management (IAM) challenges as corporations, they also must overcome a number of complex and unique hurdles that typically aren’t seen in corporate enterprise deployments.

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 2

In our last post, we discussed the growing role of two-factor authentication (2FA) in university security as more and more federal regulations are advocating or flat-out mandating its implementation.

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 1

Today, institutions of higher education face a dizzying array of regulations. These regulations increasingly force colleges and universities to adopt stronger security measures as they combat more and more cybersecurity threats. Many of these regulations mandate two-factor authentication (2FA) to ensure that the right person is accessing sensitive information.

Read More

Addressing Cyber Security Threats in Higher Education With an Integrated Approach

With the explosion of the number of cyberthreats, higher education institutions are struggling to secure their IT infrastructures in the face of limited budgets and staff. Add to this the decentralized nature of these institutions, and you have a recipe for cyber disaster.

Read More

What New Federal Regulations Mean for Student Data Management in Higher Education

At the end of 2017, the first deadline passed to comply with a new set of federal regulations that will force colleges and universities that enter into contracts with federal agencies to tighten their cybersecurity practices. The Department of Education has made it clear that it will compel universities and colleges to comply with NIST’s Special Publication 800-171, which is designed to protect the confidentiality of controlled unclassified information (CUI).

Read More

PCI Compliance as Part of University Security...Why So Difficult?

While complying with the Payment Card Industry Data Security Standard (PCI DSS) can be a challenge for any organization, there are specific hurdles to compliance for higher education. 

Read More

Our Top IAM Blog Posts for Education in 2017

Last week, we released our top five most popular Enterprise IAM Blogs from 2017. This week, we want to take a look back at some of our favorite higher education and K12 education-related content. From ransomware, to managing transient users, to student data privacy, we’ve covered a wide range of key topics in the industry.

Read More

University Security: Implications of BYOD Policies - Part 2

Bring-your-own-device (BYOD) policies are now a necessity for universities and colleges across the country. In Part 1 of this series, we covered the positives and negatives of BYOD, as well as the security implications of such policies. In this post, we’ll go over how to easily implement secure BYOD using a modern identity and access management (IAM) platform.

Read More

University Security: Implications of BYOD Policies - Part 1

Bring your own device, or BYOD, is a fast-growing trend on higher-education campuses across the country. In fact, at least 42 percent of U.S. colleges and universities have implemented a BYOD strategy. Meanwhile, bandwidth on campuses has nearly tripled since 2012, with more than 70 percent of schools offering at least 1 GB, in part because of the need to keep up with BYOD demand.

Read More

Evaluating Common Account Username Conventions Used By Universities

Around the world, colleges and universities are welcoming students, faculty, and staff back for the fall semester. Those who are new to campus will undoubtedly need a few days to find their way around, remember their class schedules, and, of course, memorize their newly issued usernames.

Read More

Subscribe Here!