Recent Posts by Scott Kortright

 
Scott Kortright has been a technology marketer for 20 years across a diverse set of industries and specializes in Technology Product Marketing and Sales Enablement. As Identity Automation’s Vice President of Marketing, Scott leads the company in the development, planning, and execution of strategic go-to-market, communications, and product marketing initiatives. He is an avid Syracuse Orange fan, doting father, border collie lover, and happy Blue Apron customer.

Is Your District Keeping Up with 2018's Top EdTech Trends? If Not, Here's How IAM Can Help, Part 3

Remember the three Rs (reading, writing, and arithmetic)? They’ve been joined by the four Cs: collaboration, creativity, critical thinking, and communication, thanks to growing usage of technology in the classroom.

Read More

British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 1

On September 7, 2018, British Airways disclosed that a data breach had impacted customer information taken from approximately 380,000 booking transactions conducted between August 21 and September 5, 2018.

Although the attack wasn’t elaborate, it was effective. A cyber attacker installed malware on British Airways’ website using a known security vulnerability to introduce malicious code that altered the behavior of the booking website—without penetrating the network or servers in a way that could trigger additional alerts.

Read More

Is Your District Keeping Up with 2018's Top EdTech Trends? If Not, Here's How IAM Can Help, Part 2


In part one of our series on EdTech trends, we looked at the top three trends in 2018 and what they mean for schools. These trends—data-driven instruction, using technology to equip students with 21st century skills, and Google’s dominance in the classroom—all have the power to transform the way today’s students learn and perform.

Read More

Is Your District Keeping Up with 2018's Top EdTech Trends? If Not, Here's How IAM Can Help, Part 1

Step into a classroom today, and you’ll see the familiar bulletin boards, desks, and chairs that you remember from your childhood. You’ll also see some newer additions—tablets, Chromebooks, and big touch screens. The use of technology in the classroom is rising, and there are distinct trends emerging as a result.

Read More

The Zero Trust Model - What It is and Why It Starts with Identity

The digital transformation has significantly increased risk exposure for enterprises. With users operating a variety of devices from a variety of locations, there is a greater attack surface with less IT oversight and control.

Read More

Alternative Authentication for Students, Part 2 - Pictograph Authentication


Technology in the classroom creates usability issues for very young students in pre-k, kindergarten, and first grade, as well as special education students. For many of these students, remembering and typing even simple usernames and traditional passwords is a struggle.

Read More

Alternative Authentication for Students, Part 1 - QR Code Badges



Schools are integrating technology and cloud resources into the classroom with ever-growing frequency. Overall education technology spending is expected to reach $19 billion by 2019 on a global scale. It’s easy to see why: Technology in the classroom has the ability to increase collaboration and productivity, create a more personalized learning experience, and enable teachers to distribute assignments and provide real-time feedback.

Read More

Retail Data Breach Update: Top 3 Cyber Threats To Retailers and how IAM Can Help

While the volume of cyberattacks is on the rise across the board—attacks are up 100 percent since 2015—retail is particularly at risk. And the numbers back that up.

One study found that retailers respond to cyberattacks on average twice a week, with an astonishing 16 percent experiencing attempted attacks daily.

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 2

In our last post, we discussed the growing role of two-factor authentication (2FA) in university security as more and more federal regulations are advocating or flat-out mandating its implementation.

Read More

Two-Factor Authentication (2FA) Explained: Biometric Authentication

With multi-factor authentication (MFA), there are three types of authentication factors: something you know (knowledge), something you have (possession), and something you are (inherence).

Read More

Subscribe Here!