You probably read about the MLB data breach from earlier this summer involving the Houston Astros reportedly being ‘hacked’ by the St. Louis Cardinals.
Last month I wrote an article for Entrepreneur.com titled Identify and Stop Rogue Employees Before They Become a Security Threat. The article focused on the rogue employees we detailed in our eBook, The 3 Types of Rogue Employees - and How to Stop Them - the innovative, the bad and the lazy.
In case you weren’t able to attend the Identity Automation sponsored, Texas CTO 2015 Summer Clinic in Austin, TX, or if you missed the keynote speaker, Mark Strama, Head of Google Fiber Operations in Austin, TX, we’re here to bring you some highlights and lessons learned!
Last month, Identity Automation sponsored the South Texas Information Systems Security Association (ISSA) Luncheon in Houston, TX, and it was a huge success!
When the public school system of Minnetonka, Minnesota, came to us to help implement a new Identity Automation Management system, they had very specific needs - and many of them. They had an infrastructure that no longer suited their needs and was technologically unwieldy, so they turned to us to provide an easy-to-manage, secure IAM platform for over 10,000 students in grades K-12 and their educators. We not only met their expectations, but exceeded them.
Identity Automation will be hosting a webinar with Carahsoft to examine the trends in identity management technology that will be impacting the K-12 space over the next 1-2 years. We’ll be discussing the challenges and opportunities of security management tools and educational technologies and how they can be used to advance student education and privacy.
You can take all the security precautions in the world, but if someone really wants to attack your organization’s infrastructure, they’re going to find a way. With hackers who are able to stay one step ahead of the security precautions we put in place, it’s not inaccurate to say that it’s inevitable you will be attacked.
Last week, Adobe issued an emergency security patch fixing a critical flaw in its Flash Player that could allow a remote hacker to take complete control of Windows, Mac and Linux computers.
I recently spoke with the IT director of a school district, and he shared with me some concerns school administrators had about our password management solution and whether it could actually make them less secure. I am rarely at a loss for words in my line of work, but in this instance, I was close.
As educators around the country look toward mobile and internet applications to enhance student learning, new privacy concerns are beginning to surface. These student information security woes are often beyond the reach of the IT administrators, and instead put into the hands of teachers who may unintentionally cause sensitive data to be released with as little as a simple app sign-up. Unlike many of the historic applications used by school systems in the past, today’s apps circumvent federal privacy regulations by providing educational tools to teachers from third-party platforms that are often notvetted by IT administrators in advance.
current_page_num+2: 40 -