Identity Automation Blog

Recent Posts by Jill Kressin

 
Jill Kressin is a skilled content marketer with over three years of experience in the information technology industry. As Identity Automation’s Content Marketing Specialist, she develops content in a variety of styles for a wide array of media, including blog articles, press releases, customer spotlights, data sheets, brochures, website pages, emails, and social media. Outside Marketing, Jill enjoys traveling, yoga, reading, kayaking, and attending concerts.

The Latest Ransomware Attack: The Baltimore Incident & How to Protect Your Org

In early May, the city of Baltimore was hit by a massive ransomware attack which crippled city employees and residents from their day-to-day tasks for weeks, ultimately costing millions in taxpayer dollars. Ransomware, a type of malware or malicious software that weaponizes encryption, is used by hackers to first encrypt data on a victim’s machine, blocking access to a computer system or service.

Read More

Putting Identity and Access Management at the Core of Cybersecurity in the Healthcare Industry

With constantly evolving security and compliance regulations, it may seem impossible for healthcare organizations to sustain a high level of security, while also ensuring quick, efficient access to systems and data.

Read More

A Look at Single Sign-On Solution Maturity — How Do Your Organization’s SSO Capabilities Stack Up? Part One

Single sign-on, also known as SSO, is a widely popular component of identity and access management (IAM) that not only helps organizations address important access challenges, it also offers clear productivity and user experience benefits.

Read More

Leading the Discussion on Exception Handling in Access Management at the 2019 NYS Cyber Security Conference

Last month, our top Identity and Access Management (IAM) experts escaped the Texas heat and traveled to Albany, New York for the 22nd Annual New York State (NYS) Cyber Security Conference.

Read More

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part Two

Chances are, you’ve encountered multi-factor authentication (MFA) at some point. Perhaps you entered your username and password to log into your bank’s online portal, and although they were correct, the system challenged you with a second form of authentication.

Read More

Federated Identity Management: Defining the Levels of the Federation Maturity Model, from Basic to Mesh

Recently, we discussed maturity models, and why we believe that federated identity management is the most logical first step in the Identity and Access Management (IAM) Maturity Model.

Read More

Meet Our Team: Samuel Carter, Manager of Training

Identity Automation could not be where it is today without our team. Our people are the driving force behind Identity Automation’s successes, growth, and ability to adapt to the ever-changing technology landscape.

Read More

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part One

By now, we should all be aware of the inadequacies of passwords. Breach after breach, it's been made painfully clear that single-factor authentication is not enough. In fact, according to the 2017 Verizon Data Breach Report, over 80% of hacking related breaches are due to weak or stolen passwords.

Read More

CoSN 2019 Recap: Why School Districts Need More than Just Single Sign-On

Last month, Identity Automation’s top K12 education experts traveled to Portland, Oregon for the Consortium for School Networking (CoSN) 2019 Annual Conference. CoSN, a member-based association and advocacy group, spotlights emerging technologies to K12 EdTech leaders.

Read More

Federated Identity Management: A Logical First Step in the IAM Maturity Model

Identity and Access Management (IAM) is a complex discipline that encompasses a number of distinct tenets, such as multi-factor authentication (MFA), single sign-on (SSO), and identity lifecycle management (ILM). When it comes to IAM, organizations have widely varying levels of maturity. While some have full-featured, modern IAM solutions in place, others are just making the move to cloud- or SaaS-based applications and are still manually creating users and passwords.

Read More

Subscribe Here!