Identity Automation at Houston SecureWorld 2015

Last week, a couple of us on the Identity Automation team attendedHouston SecureWorld 2015 courtesy of a special invite from the Information Systems Security Association (ISSA). Many thanks to our friends at ISSA for the opportunity to serve on their behalf.

Read More

Learnings from EiC 2015 by KuppingerCole

A few weeks ago, James Litton and I touched down in Munich to speak at Kuppingercole's European Identity & Cloud Conference 2015, where we also had the pleasure of speaking with innovation leaders shaping the future of IT. I wanted to share some of my thoughts and observations from the event:

Read More

Student Privacy in Education: Part 2 - The Student Privacy Pledge and Implications for IT Vendors and Schools

Student privacy is an extremely delicate topic, important to parents, teachers, administrators, researchers, and students themselves. When we explored the history of student privacy legislation last week, we found a great deal of tension between the legal definition of student privacy and public perceptions of what privacy should be.

Read More

Student Privacy in Education: Part 1 - The History of Student Privacy

In February, we announced that we joined over 100 organizations, including Apple, Google, the Khan Academy and Microsoft in supporting the Student Privacy Pledge. Then in March, at both the Brainstorm 16.0 Conference and CoSN Annual Conference, student privacy surfaced as a leading topic of discussion.

Read More

Your Biggest Security Threat? Rogue Employees

Guess who may be bringing unwanted risk to your organization? Surprisingly, it’s a rogue employee. Even Oracle CEO, Mark Hurd, had this to say“Most cyber attacks are not from nation states. Most, like 95 percent, come from within a company’s four walls.”

But do you know how to spot them? And how you can stop them?

Many of the biggest attacks originate from inside the enterprise from fully authenticated users. And these rogue employees don’t always have malicious intent; sometimes they’re dedicated employees who mistakenly committed an oversight.

Read More

Next Week, Interop 2015 in Las Vegas!

Our team is gearing up for Interop 2015 in Las Vegas next week and we’re excited to be part of a great event! What we’re looking forward to the most is helping you find new ways to address your current IT headaches and plan for the future. 

Read More

Preview: CoSN 2015 New York CTO Clinic

 As I was preparing for tomorrow’s CoSN 2015 New York CTO Clinic on Long Island, I came across somearticles from the other side of the country, in Colorado, debating topics like protecting student data, protecting student privacy, and bolstering FERPA.

Read More

Is Your School District Ready for an IT Advisory Committee?

Peek inside any K-12 classroom and you may find students taking a test on a desktop computer or a teacher connecting with a satellite school via video conferencing. Technology has transformed the regular classrooms of today to the learning centers of tomorrow.

Read More

Supporting a Modern Ed Tech Program in ESEA

Digital tools are as critical to student learning today as pen and paper ​have been in the past. We at Identity Automation support the addition of the Enhancing Education Through Technology ​bill ​to the Elementary and Secondary Education Act​ (ESEA)​.​ This bill would ensure a dedicated and well-funded tech program would be part of the revised ESEA.​ The​ effort ​to make this revision ​is currently led by Senator Tammy Baldwin (D-WI) and Senator Lamar Alexander (R-TN) and is up for a vote later this afternoon. 

Read More

How To Handle High Ranking Access Hoarders

Internal security vulnerabilities are the most likely ‘attacks’ a business faces. Many of the biggest attacks actually originate from inside your enterprise and come from fully authenticated users - your employees. Some of these intrusions stem from employees bypassing security standards, while others are caused by employees who may not know the security standards. But the threat we’re seeing more and more is the employee we refer to as the access hoarder.

Read More

Subscribe Here!