Meet the Newest Member of the Forbes Technology Council: James Litton, CEO of Identity Automation

I’m excited to share our latest press release announcing James’ acceptance into Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs, and technology executives. Forbes Councils are a collective of communities with nine industry-specific councils, including the Forbes Technology Council, where exceptional business owners and leaders come together with the people and resources that can help them thrive. 

Read More

Preventing the Top Healthcare Cybersecurity Risks with IAM, Part 2 - Malware and Ransomware

Over the past 10 years, the healthcare industry has experienced a drastic rise in cyberattacks and data breaches. The number of reported healthcare-related data breaches has consistently grown every year since the Department of Health and Human Services began tracking breaches in 2009—and 2018 was no different.

Read More

The Latest Ransomware Attack: The Baltimore Incident & How to Protect Your Org

In early May, the city of Baltimore was hit by a massive ransomware attack which crippled city employees and residents from their day-to-day tasks for weeks, ultimately costing millions in taxpayer dollars. Ransomware, a type of malware or malicious software that weaponizes encryption, is used by hackers to first encrypt data on a victim’s machine, blocking access to a computer system or service.

Read More

Putting Identity and Access Management at the Core of Cybersecurity in the Healthcare Industry

With constantly evolving security and compliance regulations, it may seem impossible for healthcare organizations to sustain a high level of security, while also ensuring quick, efficient access to systems and data.

Read More

A Look at Single Sign-On Solution Maturity — How Do Your Organization’s SSO Capabilities Stack Up? Part One

Single sign-on, also known as SSO, is a widely popular component of identity and access management (IAM) that not only helps organizations address important access challenges, it also offers clear productivity and user experience benefits.

Read More

Leading the Discussion on Exception Handling in Access Management at the 2019 NYS Cyber Security Conference

Last month, our top Identity and Access Management (IAM) experts escaped the Texas heat and traveled to Albany, New York for the 22nd Annual New York State (NYS) Cyber Security Conference.

Read More

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part Two

Chances are, you’ve encountered multi-factor authentication (MFA) at some point. Perhaps you entered your username and password to log into your bank’s online portal, and although they were correct, the system challenged you with a second form of authentication.

Read More

Rostering and Identity and Access Management: Bridging the Gap Between Convenience and Security

*Disclaimer: This article originally appeared in EmergingEdTech, Administrative Solutions posts

School districts throughout the country rely on technology today more than ever before. At many districts, laptops and tablets are standard-issue equipment for students as young as second grade-level, and they must be compatible with campus networks as well as in the home.

Read More

The Unavoidable and Expanding Impact of GDPR Compliance on Higher Education

Each year, the United States hosts over a million foreign students. And for the schools they attend, this often means complying with rules and regulations that these students bring with them from their home countries. 

Read More

Federated Identity Management: Defining the Levels of the Federation Maturity Model, from Basic to Mesh

Recently, we discussed maturity models, and why we believe that federated identity management is the most logical first step in the Identity and Access Management (IAM) Maturity Model.

Read More

Subscribe Here!