Identity Automation Blog

How The Department of Defense can use identity management to protect critical information

The Department of Defense and other federal agencies with national security responsibilities need extra layers of protection to efficiently secure data, especially from the inside. For this critical level of protection, many organizations employ a variety of technologies, including advanced endpoint protection, database activity monitoring, and identity and account management tools, not only to help guard against internal threats, but to also manage their systems more efficiently.

Read More

ISACA CyberSecurity Conference

Save the Date for two of the most informative conferences on cyber security this year, all under one roof!

Read More

Learn the Benefits of Automated Identity Access Management

Did you know that 50-60% of today’s organizations still rely on manual Identity Access Management (IAM)?

While automated IAM technologies like RapidIdentity enable administrators to automatically provision and monitor users and grant time-based access, manual IAM requires admins to manually change these factors for each individual within the organization. This system can lead to lapses in access restriction and ultimately large losses in time, money and security.

Read More

When a “Hacker” isn’t Really a Hacker

You probably read about the MLB data breach from earlier this summer involving the Houston Astros reportedly being ‘hacked’ by the St. Louis Cardinals.

Read More

Clarifying "Rogue Employees"

Last month I wrote an article for Entrepreneur.com titled Identify and Stop Rogue Employees Before They Become a Security Threat. The article focused on the rogue employees we detailed in our eBook, The 3 Types of Rogue Employees - and How to Stop Them - the innovative, the bad and the lazy.

Read More

Important Security News: Update your Adobe Flash Player now

Last week, Adobe issued an emergency security patch fixing a critical flaw in its Flash Player that could allow a remote hacker to take complete control of Windows, Mac and Linux computers.

Read More

Don't Allow a Lazy!

At the end of April we published a couple pieces of content focused on rogue employees, a security threat facing nearly every company in the world. Rogue employees are those fully vetted users inside your company who probably have no malicious intent to cause harm, but end up doing so regardless, for a variety of reasons ranging from laziness to oversights to hoarding access.

Read More

The Overlooked Nature of Internal Security Vulnerabilities

Last week, Steven Norton published a blog post to The Wall Street Journal’s CIO Journal about increases in ‘next-gen’ security spending. It was a good post highlighting something that I think most people are aware of - enterprise security threats are very real and more and more enterprises are putting technologies and processes in place to prevent them.

Read More

BYOD The Good, The Bad and The Ugly

Today I read an article in NetworkWorld entitled “BYOD early adopters cite sticker shock”. I have discussed BYOD with many of our customers and, personally, I can’t buy into it. To explain, here is my take on BYOD, the good, the bad and the ugly.

Read More

Privileged User Access

I have been around Information Technology for 20 years and managing Privileged User Access has always been a challenge.

Read More

Subscribe Here!