Identity Automation Blog

Recent Posts by Michael Webb

 
As Chief Technology Officer at Identity Automation, Michael Webb leads Product Management and Software Development to deliver innovative Identity and Access Management solutions. Michael is a high-performance technology leader with more than 22 years of experience. He brings expertise in strategic planning, software development practices, distributed computing, SaaS, big data analytics, product & technology strategy, M&A strategy, and cybersecurity. Prior to Identity Automation, Michael worked at GSM, SmartVault Corporation, and Symantec Corporation. Michael holds a Computer Science degree from the University of North Texas.
Find me on:

Spear Phishing on the Rise, but Help is on the Way!

A white paper released by PIXM highlights an alarming trend in cyberattacks targeting school districts across the United States. This document uncovers a significant uptick in spear phishing campaigns over the last two months, orchestrated by two notorious threat groups known as Tycoon and Storm-1575.

Read More

Enhancing Security with OAuth 2.1: What You Need to Know

OAuth is a standard for sharing user account authentication data across various platforms. The name of this technology is quite literal - it's called Open Authorization. OAuth is an open standard that has been in development since 2006 when software engineer Blaine Cook worked on Twitter's OpenID implementation. Google joined in 2007, and OAuth 1.0 was released in 2010. Since then, many tech companies, including Facebook (Meta) and Microsoft, as well as smaller platforms, have adopted the open standard. OAuth 2.0 was published in 2012 and has been the most widely used open standard for user account federation ever since.

Read More

Passwordless Authentication

Passwords are one of the most confusing concepts in secure authentication for typical users.

Read More

What is ITDR (Identity Threat Detection Response)

The past couple of decades have seen an immense evolution in the cyber threat landscape and how organizations and enterprises utilize IT. Threat actors develop new cyber exploitation techniques, and concurrently cybersecurity solution vendors develop new technologies and methodologies. Those new technologies and methodologies often get branded with a new acronym that soon became part of the vernacular of SOC analysts everywhere.

Read More

QR Codes are an Emerging Cyberattack Vector

 

It’s 2023, and QR codes have been ubiquitous for well over a decade now.

Read More

Protecting Your Institution from the Threat of Spear Phishing

Stop-Threats-Real-Time

Spear phishing is one of the most potentially destructive types of cyberattacks ever.

Read More

Why Zero Trust Is the Foundation of a Strong K-12 Cybersecurity Program

While technology has created boundless new opportunities for learning, it has also produced ever-growing data security challenges. In years past, cyber defensive strategies were confined to internal environments.

Read More

Subscribe Here!