Recent Posts by Kathleen Garska

 
Kathleen Garska, Identity Automation's Director of Marketing, is an experienced digital marketer and marketing communications specialist within the B2B and technology spaces. With a decade of professional writing and editing experience, Kathleen heads Identity Automation's marketing department, managing the strategic direction of the company's blog, website, content resources, digital marketing and demand generation efforts. Beyond Marketing, Kathleen is a dedicated (see: obsessed) dog mom to two rotten terriers, and she loves art, travel, cooking, yoga, and cycling.

Meeting Compliance Requirements - What Your Organization Should Know

Let’s be real. Attackers are growing more and more emboldened by the day. As their tools become so simple that even “script kiddies” can use them to wreak havoc on unsuspecting targets, governing bodies are putting added emphasis on tighter regulatory compliance.

Read More

Retail Data Breach Update: Top 3 Cyber Threats To Retailers and how IAM Can Help

While the volume of cyberattacks is on the rise across the board—attacks are up 100 percent since 2015—retail is particularly at risk. And the numbers back that up.

One study found that retailers respond to cyberattacks on average twice a week, with an astonishing 16 percent experiencing attempted attacks daily.

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 2

In our last post, we discussed the growing role of two-factor authentication (2FA) in university security as more and more federal regulations are advocating or flat-out mandating its implementation.

Read More

Two-Factor Authentication (2FA) Explained: Biometric Authentication

With multi-factor authentication (MFA), there are three types of authentication factors: something you know (knowledge), something you have (possession), and something you are (inherence).

Read More

Assigning Authentication Risk Levels, the Problem with the Traditional Approach

The employees in your organization are all different. There are people in marketing and finance and HR. There are people who always work from the office, those who always work from home, and those always on the road. Some employees need lots of access to sensitive data and systems to do their job, while others only need basic access to standard applications.

Read More

Two-Factor Authentication (2FA) Explained: Bluetooth Authentication

In today’s world of increasing cyberthreats, more and more pressure is being put on companies to increase security with stringent authentication processes. However, companies and their users seek methods that won’t negatively impact user experience.

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 1

Today, institutions of higher education face a dizzying array of regulations. These regulations increasingly force colleges and universities to adopt stronger security measures as they combat more and more cybersecurity threats. Many of these regulations mandate two-factor authentication (2FA) to ensure that the right person is accessing sensitive information.

Read More

Benefits of Single Sign-On Solutions

Many of our customers implement our Identity and Access Management (IAM) platform for its identity lifecycle management capabilities. And with good reason—automating these tasks means IT no longer has to waste valuable time and resources creating and managing accounts or provisioning and deprovisioning systems and target applications.

Read More

Two-Factor Authentication (2FA) Explained: FIDO U2F

In an era of constant cyberthreats, enterprises are looking to beef up their security posture. A strategy being used by more and more companies is multi-factor authentication (MFA).

One of the most secure authentication methods is Fast Identity Online (FIDO) Universal Second Factor (U2F), an emerging universal standard for tokens with native support in platforms and browsers.

Read More

How to Address Shadow IT in Higher Ed

Does your university have a shadow IT problem? The answer is most likely yes. Higher education institutions across the country are struggling with shadow IT challenges resulting from devices, services, and software residing outside of IT’s control and/or ownership.

Read More

Subscribe Here!