The Latest Ransomware Attack: The Baltimore Incident & How to Protect Your Org

In early May, the city of Baltimore was hit by a massive ransomware attack which crippled city employees and residents from their day-to-day tasks for weeks, ultimately costing millions in taxpayer dollars. Ransomware, a type of malware or malicious software that weaponizes encryption, is used by hackers to first encrypt data on a victim’s machine, blocking access to a computer system or service.

Read More

Putting Identity and Access Management at the Core of Cybersecurity in the Healthcare Industry

With constantly evolving security and compliance regulations, it may seem impossible for healthcare organizations to sustain a high level of security, while also ensuring quick, efficient access to systems and data.

Read More

A Look at Single Sign-On Solution Maturity — How Do Your Organization’s SSO Capabilities Stack Up? Part One

Single sign-on, also known as SSO, is a widely popular component of identity and access management (IAM) that not only helps organizations address important access challenges, it also offers clear productivity and user experience benefits.

Read More

Leading the Discussion on Exception Handling in Access Management at the 2019 NYS Cyber Security Conference

Last month, our top Identity and Access Management (IAM) experts escaped the Texas heat and traveled to Albany, New York for the 22nd Annual New York State (NYS) Cyber Security Conference.

Read More

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part Two

Chances are, you’ve encountered multi-factor authentication (MFA) at some point. Perhaps you entered your username and password to log into your bank’s online portal, and although they were correct, the system challenged you with a second form of authentication.

Read More

Rostering and Identity and Access Management: Bridging the Gap Between Convenience and Security

*Disclaimer: This article originally appeared in EmergingEdTech, Administrative Solutions posts

School districts throughout the country rely on technology today more than ever before. At many districts, laptops and tablets are standard-issue equipment for students as young as second grade-level, and they must be compatible with campus networks as well as in the home.

Read More

The Unavoidable and Expanding Impact of GDPR Compliance on Higher Education

Each year, the United States hosts over a million foreign students. And for the schools they attend, this often means complying with rules and regulations that these students bring with them from their home countries. 

Read More

Federated Identity Management: Defining the Levels of the Federation Maturity Model, from Basic to Mesh

Recently, we discussed maturity models, and why we believe that federated identity management is the most logical first step in the Identity and Access Management (IAM) Maturity Model.

Read More

Meet Our Team: Samuel Carter, Manager of Training

Identity Automation could not be where it is today without our team. Our people are the driving force behind Identity Automation’s successes, growth, and ability to adapt to the ever-changing technology landscape.

Read More

Announcing the Launch of the Identity Automation Partner Program - VIP

I’m thrilled to share our latest press release announcing the launch of the Identity Automation Partner Program - VIP as the next critical element of the Identity Automation 2.0 growth strategy, a targeted initiative to scale the business with increased focus on execution.

Read More

Subscribe Here!