Recent Posts by Kathleen Garska

 
Kathleen Garska, Identity Automation's Director of Marketing, is an experienced digital marketer and marketing communications specialist within the B2B and technology spaces. With a decade of professional writing and editing experience, Kathleen heads Identity Automation's marketing department, managing the strategic direction of the company's blog, website, content resources, digital marketing and demand generation efforts. Beyond Marketing, Kathleen is a dedicated (see: obsessed) dog mom to two rotten terriers, and she loves art, travel, cooking, yoga, and cycling.

Identity Automation and Adnet Announce Strategic Partnership

Strategic Alignment Poised to Deliver Comprehensive Identity and Access Management Platform to Oceania Region

Sydney, Australia, January 28, 2019 ⎯ Identity Automation, leading provider of Identity and Access Management (IAM) solutions, and Adnet Technology Australia, IT procurement and services delivery provider within the Oceanic region, today announced their strategic partnership to support organizations in the Oceania region.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 3

Another year, another series of data breach headlines. 2018 has come to a close, and we’ve been looking back at one of the year’s biggest and potentially costliest breaches: the British Airways data breach that was announced back in September. With approximately 380,000 booking transactions exposed and more than $1 billion in potential fines and lawsuits, the breach offers many important lessons.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 2

The recent British Airways breach is only one of many recent breach headlines, but it got us thinking about the importance of getting security basics right. All too often, the biggest breach headlines—and the ones with the largest financial and reputational impact—are the result of minor and preventable security vulnerabilities.

Hackers continue to use the same tried and tested techniques because they know that, all too often, companies aren't putting enough time and effort into basic security measures.

Read More

Is Your District Keeping Up with the Top EdTech Trends? If Not, Here's How IAM Can Help, Part 3

Remember the three Rs (reading, writing, and arithmetic)? They’ve been joined by the four Cs: collaboration, creativity, critical thinking, and communication, thanks to growing usage of technology in the classroom.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 1

On September 7, 2018, British Airways disclosed that a data breach had impacted customer information taken from approximately 380,000 booking transactions conducted between August 21 and September 5, 2018.

Although the attack wasn’t elaborate, it was effective. A cyber attacker installed malware on British Airways’ website using a known security vulnerability to introduce malicious code that altered the behavior of the booking website—without penetrating the network or servers in a way that could trigger additional alerts.

Read More

Is Your District Keeping Up with the Top EdTech Trends? If Not, Here's How IAM Can Help, Part 2


In part one of our series on EdTech trends, we looked at the top three trends in 2018 and what they mean for schools. These trends—data-driven instruction, using technology to equip students with 21st century skills, and Google’s dominance in the classroom—all have the power to transform the way today’s students learn and perform.

Read More

Is Your District Keeping Up with the Top EdTech Trends? If Not, Here's How IAM Can Help, Part 1

Step into a classroom today, and you’ll see the familiar bulletin boards, desks, and chairs that you remember from your childhood. You’ll also see some newer additions—tablets, Chromebooks, and big touch screens. The use of technology in the classroom is rising, and there are distinct trends emerging as a result.

Read More

Why Legacy, Homegrown, and Open-Source IAM Systems Can't Address Higher Education's Identity Management Challenges

While higher education institutions face many of the same identity and access management (IAM) challenges as corporations, they also must overcome a number of complex and unique hurdles that typically aren’t seen in corporate enterprise deployments.

Read More

Security Breaches in Healthcare That Scare Even Us


Though many of us know that healthcare data is valuable, not all of us are aware of exactly how valuable it is. Electronic health records (EHRs) are a one-stop shop for all the data a hacker wants: medical, financial, and personal. Some data doesn’t age either—for example, your birth date and Social Security number never change.

Read More

Two-Factor Authentication (2FA) Explained: Email and SMS OTPs

One time passwords (OTPs) are a popular choice for organizations looking to step up their security with two-factor authentication (2FA). These randomly generated passwords are only valid for a single login session and overcome many of the vulnerabilities of traditional passwords.

Read More

Subscribe Here!