A Protocol Predicament - When Apps Come to Class

News of a school district grappling with the security pitfalls of access management made headlines recently and it caught our eye. According to ZDNet, when Bearden Middle School in Knoxville, Tennessee issued new iPads to their students as part of the national iPads for Kids Program, they had few options at their disposal for securing them.

Read More

The Internet of Insecurity: How IoT Puts Information at Risk

To say that the Internet of Things (IoT) has been a hot topic lately would be an understatement. Over the last few years, talk about IoT has rocketed from zero to a hundred, and has created a growing number of eager early adopters who want to take shiny, new IoT devices home with them right now. At the same time, some businesses have already started dipping their toes into the IoT lake. However, like many technologies ahead of their time, the increase in the number of IoT devices is quickly outpaced by the number of ways they can be breached by cyber criminals.

Read More

How The Department of Defense can use identity management to protect critical information

The Department of Defense and other federal agencies with national security responsibilities need extra layers of protection to efficiently secure data, especially from the inside. For this critical level of protection, many organizations employ a variety of technologies, including advanced endpoint protection, database activity monitoring, and identity and account management tools, not only to help guard against internal threats, but to also manage their systems more efficiently.

Read More

ISACA CyberSecurity Conference

Save the Date for two of the most informative conferences on cyber security this year, all under one roof!

Read More

Learn the Benefits of Automated Identity Access Management

Did you know that 50-60% of today’s organizations still rely on manual Identity Access Management (IAM)?

While automated IAM technologies like RapidIdentity enable administrators to automatically provision and monitor users and grant time-based access, manual IAM requires admins to manually change these factors for each individual within the organization. This system can lead to lapses in access restriction and ultimately large losses in time, money and security.

Read More

When a “Hacker” isn’t Really a Hacker

You probably read about the MLB data breach from earlier this summer involving the Houston Astros reportedly being ‘hacked’ by the St. Louis Cardinals.

Read More

Clarifying "Rogue Employees"

Last month I wrote an article for Entrepreneur.com titled Identify and Stop Rogue Employees Before They Become a Security Threat. The article focused on the rogue employees we detailed in our eBook, The 3 Types of Rogue Employees - and How to Stop Them - the innovative, the bad and the lazy.

Read More

Important Security News: Update your Adobe Flash Player now

Last week, Adobe issued an emergency security patch fixing a critical flaw in its Flash Player that could allow a remote hacker to take complete control of Windows, Mac and Linux computers.

Read More

Don't Allow a Lazy!

At the end of April we published a couple pieces of content focused on rogue employees, a security threat facing nearly every company in the world. Rogue employees are those fully vetted users inside your company who probably have no malicious intent to cause harm, but end up doing so regardless, for a variety of reasons ranging from laziness to oversights to hoarding access.

Read More

The Overlooked Nature of Internal Security Vulnerabilities

Last week, Steven Norton published a blog post to The Wall Street Journal’s CIO Journal about increases in ‘next-gen’ security spending. It was a good post highlighting something that I think most people are aware of - enterprise security threats are very real and more and more enterprises are putting technologies and processes in place to prevent them.

Read More

Subscribe Here!