Identity Automation Blog

Rise of the Rogue Employees

Yes, this post’s title is a little dramatic. Chalk it up to my excitement for next month’s release of the latest Star Wars installment, Star Wars Episode VII: The Force Awakens. Revenge of the Rogues seemed way too dramatic and not at all accurate (little bit of trivia for you, Revenge of the Jedi was the original planned name for Star Wars Episode VI) and The Rogues Strikes Back is probably even worse. 

Read More

IoT Affects the Enterprise Too

The Internet of Things (IoT) has become a very popular topic with the media and bloggers over the past few years. When it’s discussed, it’s typically in association with consumer devices, an aspect I never gave much thought to until last week when I was discussing the 2013 Target breach, and this post from Brian Krebs in particular, with a colleague.

Read More

A Protocol Predicament - When Apps Come to Class

News of a school district grappling with the security pitfalls of access management made headlines recently and it caught our eye. According to ZDNet, when Bearden Middle School in Knoxville, Tennessee issued new iPads to their students as part of the national iPads for Kids Program, they had few options at their disposal for securing them.

Read More

The Internet of Insecurity: How IoT Puts Information at Risk

To say that the Internet of Things (IoT) has been a hot topic lately would be an understatement. Over the last few years, talk about IoT has rocketed from zero to a hundred, and has created a growing number of eager early adopters who want to take shiny, new IoT devices home with them right now. At the same time, some businesses have already started dipping their toes into the IoT lake. However, like many technologies ahead of their time, the increase in the number of IoT devices is quickly outpaced by the number of ways they can be breached by cyber criminals.

Read More

How The Department of Defense can use identity management to protect critical information

The Department of Defense and other federal agencies with national security responsibilities need extra layers of protection to efficiently secure data, especially from the inside. For this critical level of protection, many organizations employ a variety of technologies, including advanced endpoint protection, database activity monitoring, and identity and account management tools, not only to help guard against internal threats, but to also manage their systems more efficiently.

Read More

ISACA CyberSecurity Conference

Save the Date for two of the most informative conferences on cyber security this year, all under one roof!

Read More

Learn the Benefits of Automated Identity Access Management

Did you know that 50-60% of today’s organizations still rely on manual Identity Access Management (IAM)?

While automated IAM technologies like RapidIdentity enable administrators to automatically provision and monitor users and grant time-based access, manual IAM requires admins to manually change these factors for each individual within the organization. This system can lead to lapses in access restriction and ultimately large losses in time, money and security.

Read More

When a “Hacker” isn’t Really a Hacker

You probably read about the MLB data breach from earlier this summer involving the Houston Astros reportedly being ‘hacked’ by the St. Louis Cardinals.

Read More

Clarifying "Rogue Employees"

Last month I wrote an article for Entrepreneur.com titled Identify and Stop Rogue Employees Before They Become a Security Threat. The article focused on the rogue employees we detailed in our eBook, The 3 Types of Rogue Employees - and How to Stop Them - the innovative, the bad and the lazy.

Read More

Important Security News: Update your Adobe Flash Player now

Last week, Adobe issued an emergency security patch fixing a critical flaw in its Flash Player that could allow a remote hacker to take complete control of Windows, Mac and Linux computers.

Read More

Subscribe Here!