When a “Hacker” isn’t Really a Hacker

You probably read about the MLB data breach from earlier this summer involving the Houston Astros reportedly being ‘hacked’ by the St. Louis Cardinals.

Read More

Clarifying "Rogue Employees"

Last month I wrote an article for Entrepreneur.com titled Identify and Stop Rogue Employees Before They Become a Security Threat. The article focused on the rogue employees we detailed in our eBook, The 3 Types of Rogue Employees - and How to Stop Them - the innovative, the bad and the lazy.

Read More

In Case You Missed It: Highlights and Lessons Learned from the 2015 CTO Clinic

In case you weren’t able to attend the Identity Automation sponsored, Texas CTO 2015 Summer Clinic in Austin, TX, or if you missed the keynote speaker, Mark Strama, Head of Google Fiber Operations in Austin, TX, we’re here to bring you some highlights and lessons learned!

Read More

Exclusive: Identity Automation and ISSA Luncheon Success

Last month, Identity Automation sponsored the South Texas Information Systems Security Association (ISSA) Luncheon in Houston, TX, and it was a huge success!

Read More

Transforming Minnetonka Schools with Access Management

When the public school system of Minnetonka, Minnesota, came to us to help implement a new Identity Automation Management system, they had very specific needs - and many of them. They had an infrastructure that no longer suited their needs and was technologically unwieldy, so they turned to us to provide an easy-to-manage, secure IAM platform for over 10,000 students in grades K-12 and their educators. We not only met their expectations, but exceeded them.

Read More

Learn About the Trends and Technology Impacting K-12 IT



Identity Automation will be hosting a webinar with Carahsoft to examine the trends in identity management technology that will be impacting the K-12 space over the next 1-2 years. We’ll be discussing the challenges and opportunities of security management tools and educational technologies and how they can be used to advance student education and privacy.

Read More

Are You Ready to Contain the Inevitable?

You can take all the security precautions in the world, but if someone really wants to attack your organization’s infrastructure, they’re going to find a way. With hackers who are able to stay one step ahead of the security precautions we put in place, it’s not inaccurate to say that it’s inevitable you will be attacked.

Read More

Important Security News: Update your Adobe Flash Player now

Last week, Adobe issued an emergency security patch fixing a critical flaw in its Flash Player that could allow a remote hacker to take complete control of Windows, Mac and Linux computers.

Read More

Secrets to a Strong Password and Why We Still Need Them in Schools

I recently spoke with the IT director of a school district, and he shared with me some concerns school administrators had about our password management solution and whether it could actually make them less secure. I am rarely at a loss for words in my line of work, but in this instance, I was close.

Read More

3 Tips on Selecting Educational Apps to Maximize Learning and Minimize Data Privacy Concerns

As educators around the country look toward mobile and internet applications to enhance student learning, new privacy concerns are beginning to surface. These student information security woes are often beyond the reach of the IT administrators, and instead put into the hands of teachers who may unintentionally cause sensitive data to be released with as little as a simple app sign-up. Unlike many of the historic applications used by school systems in the past, today’s apps circumvent federal privacy regulations by providing educational tools to teachers from third-party platforms that are often notvetted by IT administrators in advance.

Read More

Subscribe Here!