Identity Automation Blog

Spear Phishing on the Rise, but Help is on the Way!

A white paper released by PIXM highlights an alarming trend in cyberattacks targeting school districts across the United States. This document uncovers a significant uptick in spear phishing campaigns over the last two months, orchestrated by two notorious threat groups known as Tycoon and Storm-1575.

Read More

Enhancing Security with OAuth 2.1: What You Need to Know

OAuth is a standard for sharing user account authentication data across various platforms. The name of this technology is quite literal - it's called Open Authorization. OAuth is an open standard that has been in development since 2006 when software engineer Blaine Cook worked on Twitter's OpenID implementation. Google joined in 2007, and OAuth 1.0 was released in 2010. Since then, many tech companies, including Facebook (Meta) and Microsoft, as well as smaller platforms, have adopted the open standard. OAuth 2.0 was published in 2012 and has been the most widely used open standard for user account federation ever since.

Read More

Passwordless Authentication

Passwords are one of the most confusing concepts in secure authentication for typical users.

Read More

What is ITDR (Identity Threat Detection Response)

The past couple of decades have seen an immense evolution in the cyber threat landscape and how organizations and enterprises utilize IT. Threat actors develop new cyber exploitation techniques, and concurrently cybersecurity solution vendors develop new technologies and methodologies. Those new technologies and methodologies often get branded with a new acronym that soon became part of the vernacular of SOC analysts everywhere.

Read More

QR Codes are an Emerging Cyberattack Vector

 

It’s 2023, and QR codes have been ubiquitous for well over a decade now.

Read More

Protecting Your Institution from the Threat of Spear Phishing

Stop-Threats-Real-Time

Spear phishing is one of the most potentially destructive types of cyberattacks ever.

Read More

The Evolution of Technology and the Power of IAM

  ISTE header (1)
 
 
My very first trip to a national technology conference was in 2005 when I attended NEC (now known as ISTE) in Philadelphia. I was invited to attend by Discovery Education because I was one of three winners of their “Win a Wireless Laptop” contest. They paid for my airfare and booked me at the Marriott Old City, where my love for the national technology conference, ISTE, was born.
 
 
Read More

Why Zero Trust Is the Foundation of a Strong K-12 Cybersecurity Program

While technology has created boundless new opportunities for learning, it has also produced ever-growing data security challenges. In years past, cyber defensive strategies were confined to internal environments.

Read More

White House Warns of Imminent Cyber-Risk: Tech Giants Immediately Confirm Breaches

On Monday (3/21/22), the White House released a statement by President Biden on our Nation’s Cybersecurity warning that “based on evolving intelligence” U.S. companies and organizations need to urgently harden their cybersecurity defenses against potentially imminent cyberattacks.

Read More

Why Your Institution's Community is the Greatest Ransomware Threat

Cybersecurity experts have long touted that “the traditional perimeter is dead” and have advocated for a zero-trust and identity-centric approach to security. However, if your identities are the most important element of a modern cybersecurity program, it is an unfortunate, but real truth that they are also the biggest threat to your systems.

Read More

Subscribe Here!