Identity Automation Blog

Recent Posts by Jill Kressin

Jill Kressin is a skilled content marketer with over three years of experience in the information technology industry. As Identity Automation’s Content Marketing Specialist, she develops content in a variety of styles for a wide array of media, including blog articles, press releases, customer spotlights, data sheets, brochures, website pages, emails, and social media. Outside Marketing, Jill enjoys traveling, yoga, reading, kayaking, and attending concerts.

The Six Essential Steps for GDPR Compliance in Higher Ed

The amount of coverage and attention the General Data Protection Regulation (GDPR) received leading up to May 2018 was intense to say the least. But even now, more than a year since that date has come and gone, organizations across the world are still either unsure or mistaken about whether they are compliant—and how to become so.

Read More

How to Build a Robust Cybersecurity Strategy by Implementing a Healthcare Security Framework, Part One

Often times, healthcare organizations have point solutions to address critical areas, but are still concerned about their broader security needs.

Read More

Navigating Identity Lifecycle Management with the IAM Capability Maturity Model, Part One

One of the most powerful tenants of any modern Identity and Access Management (IAM) system, and arguably a necessary foundational layer from a security perspective, is Identity Lifecycle Management (ILM).

Read More

A Look at Single Sign-On Solution Maturity—How Do Your Organization’s SSO Capabilities Stack Up? Part Two

At its core, Single Sign-On (SSO) is all about improving your users’ productivity and user experience. With SSO, users are able to securely access all of their applications with a single set of credentials.

Read More

Identity Automation Extends Commitment to Protect Student Data Privacy with FERPA, COPPA, and California Student Data Privacy Certifications

As learning environments steadily move toward digital curriculum, protecting student data privacy becomes more and more critical.

Read More

How Automated User Account Lifecycle Management Addresses Multiple Role Challenges in Higher Ed

Recently, we packed our bags and traveled to the scenic village of Lake Placid, New York for the 2019 State University of New York (SUNY) Technology Conference.

Read More

Delegated Administration: A Powerful IAM Tenet that Increases Business Agility, While Empowering Employees, Part One

One of the most powerful features of any modern identity and access management (IAM) solution is delegated administration. This core feature gives business users of an organization the ability to perform basic IT functions, such as new account creation, role and group assignment, and access requests, all without the capabilities and permissions typically tied to a privileged IT role.

Read More

Illustrating How Automation Increases School District Security at the Texas CTO Summer Clinic

Recently, we headed to the quaint town of Georgetown, Texas for the annual TX CTO Summer Clinic 2019, a two-day conference hosted by the Texas K12 CTO Council chapter. Created in 2003 by Texas school district Chief Technology Officers (CTOs), the Texas K12 CTO Council was the first chapter of the Consortium for School Networking (CoSN), a leading professional association for technology leaders in school districts. 

Read More

Meet the Newest Member of the Forbes Technology Council: James Litton, CEO of Identity Automation

I’m excited to share our latest press release announcing James’ acceptance into Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs, and technology executives. Forbes Councils are a collective of communities with nine industry-specific councils, including the Forbes Technology Council, where exceptional business owners and leaders come together with the people and resources that can help them thrive. 

Read More

Preventing the Top Healthcare Cybersecurity Risks with IAM, Part 2 - Malware and Ransomware

Over the past 10 years, the healthcare industry has experienced a drastic rise in cyberattacks and data breaches. The number of reported healthcare-related data breaches has consistently grown every year since the Department of Health and Human Services began tracking breaches in 2009—and 2018 was no different.

Read More

Subscribe Here!