Identity Automation Blog

Case Study: Cherokee County School District

Industry: Pre-K-12

Solutions: Products owned: RapidIdentity Cloud Lifecycle Management, Authentication, Workflow

Piloting: PhishID, SafeID, and ShieldID

Read More

Spear Phishing on the Rise, but Help is on the Way!

A white paper released by PIXM highlights an alarming trend in cyberattacks targeting school districts across the United States. This document uncovers a significant uptick in spear phishing campaigns over the last two months, orchestrated by two notorious threat groups known as Tycoon and Storm-1575.

Read More

Enhancing Security with OAuth 2.1: What You Need to Know

OAuth is a standard for sharing user account authentication data across various platforms. The name of this technology is quite literal - it's called Open Authorization. OAuth is an open standard that has been in development since 2006 when software engineer Blaine Cook worked on Twitter's OpenID implementation. Google joined in 2007, and OAuth 1.0 was released in 2010. Since then, many tech companies, including Facebook (Meta) and Microsoft, as well as smaller platforms, have adopted the open standard. OAuth 2.0 was published in 2012 and has been the most widely used open standard for user account federation ever since.

Read More

Passwordless Authentication

Passwords are one of the most confusing concepts in secure authentication for typical users.

Read More

What is ITDR (Identity Threat Detection Response)

The past couple of decades have seen an immense evolution in the cyber threat landscape and how organizations and enterprises utilize IT. Threat actors develop new cyber exploitation techniques, and concurrently cybersecurity solution vendors develop new technologies and methodologies. Those new technologies and methodologies often get branded with a new acronym that soon became part of the vernacular of SOC analysts everywhere.

Read More

QR Codes are an Emerging Cyberattack Vector

 

It’s 2023, and QR codes have been ubiquitous for well over a decade now.

Read More

Protecting Your Institution from the Threat of Spear Phishing

Stop-Threats-Real-Time

Spear phishing is one of the most potentially destructive types of cyberattacks ever.

Read More

Next-Generation Identity and Access Management: Empowering Your State's Education System with a Universal Identity Fabric

 

In the realm of education, where data drives innovation in student outcomes, security is paramount. Unfortunately, coordination and collaboration at state and local levels has been cumbersome and complex, which slows down improvements in both cybersecurity and student outcome innovation. It's time for a different approach to identity management among state education systems with identity and access management that overcomes the challenges of coordination and collaboration across districts, agencies and higher education institutions. 

Read More

The Evolution of Technology and the Power of IAM

  ISTE header (1)
 
 
My very first trip to a national technology conference was in 2005 when I attended NEC (now known as ISTE) in Philadelphia. I was invited to attend by Discovery Education because I was one of three winners of their “Win a Wireless Laptop” contest. They paid for my airfare and booked me at the Marriott Old City, where my love for the national technology conference, ISTE, was born.
 
 
Read More

Sumner-Bonney Lake School District Spotlight: Why RapidIdentity is a "Game Changer" for K-12

Spanning across the cities of Sumner and Bonney Lake, Washington, Sumner-Bonney Lake School District supports 1,075 employees and a steadily climbing student body of 10,000 through its identity access management (IAM) system management (IAM) system.

Read More

Subscribe Here!