Recent Posts by Jill Kressin

 
Jill Kressin is a skilled content marketer with over three years of experience in the information technology industry. As Identity Automation’s Content Marketing Specialist, she develops content in a variety of styles for a wide array of media, including blog articles, press releases, customer spotlights, data sheets, brochures, website pages, emails, and social media. Outside Marketing, Jill enjoys traveling, yoga, reading, kayaking, and attending concerts.

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part Two

In terms of the traditional security structure, the cloud has changed everything— its pushed the perimeter boundaries outside the organization’s four walls. With the soft perimeter of a hybrid environment, comes the complexity of additional tools and analytics that are needed to achieve the same level of visibility as with traditional edge security devices.

Read More

Announcing the Latest Release of RapidIdentity: A Look at Our Identity Management Solution’s Enhanced UI and More

At Identity Automation, we put a strong focus on our customer’s needs and strive for continuous innovation and improvement of our solutions. Therefore, we are pleased to announce the latest release of our RapidIdentity Identity and Access Management (IAM) solution, adding an enhanced user interface (UI), as well as new functionality and capabilities.

Read More

Evolving Your Organization’s Access Management Capabilities with the Identity and Access Management Maturity Model

Access Management (AM), Identity Management, Identity and Access Management (IAM), and Privileged Access Management (PAM): while these terms use similar language and act to strengthen an organization’s security posture, they each have separate and distinct meanings. 

Read More

Cyber Attacks in Schools: It CAN Happen to Your District

With over 120,000 schools in the United States, it is easy to think that your district can hide safely in the noise or that among the pack, your schools are safe. While this mindset that cyber criminals have “bigger fish to fry” may give you some peace of mind, the facts instead point to a rise in cyber attacks targeting organizations exactly like yours.

Read More

The Six Essential Steps for GDPR Compliance in Higher Ed

The amount of coverage and attention the General Data Protection Regulation (GDPR) received leading up to May 2018 was intense to say the least. But even now, more than a year since that date has come and gone,organizations across the world are still either unsure or mistaken about whether they are compliant—and how to become so.

Read More

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part One

Often times, healthcare organizations have point solutions to address critical areas, but are still concerned about their broader security needs.

Read More

Navigating Identity Lifecycle Management with the IAM Capability Maturity Model, Part One

One of the most powerful tenants of any modern Identity and Access Management (IAM) system, and arguably a necessary foundational layer from a security perspective, is Identity Lifecycle Management (ILM).

Read More

A Look at Single Sign-On Solution Maturity—How Do Your Organization’s SSO Capabilities Stack Up? Part Two

At its core, Single Sign-On (SSO) is all about improving your users’ productivity and user experience. With SSO, users are able to securely access all of their applications with a single set of credentials.

Read More

Identity Automation Extends Commitment to Protect Student Data Privacy with FERPA, COPPA, and California Student Data Privacy Certifications

As learning environments steadily move toward digital curriculum, protecting student data privacy becomes more and more critical.

Read More

Subscribe Here!