Identity Automation Blog

What Every CEO Should Know About Cybersecurity in 2017

Now that you’ve used the points outlined in the last installment of our series to discuss with your CEO how important security is to both your organization’s bottom line and your CEO’s job, it’s time to begin the process of education. There are several realities about security that your CEO must understand as you work toward a modernized security strategy that will optimally protect your organization from outside threats and inside vulnerabilities.

Read More

Strong Authentication Methods: One Size Does Not Fit All

Eliminating or reducing the number of passwords in the enterprise remains a top focus of management and security professionals alike. While single sign-on technologies, such as password managers, identity federation, and operating system-based technologies, that reduce and simplify the number of passwords have been in use for years, the number of passwords and emerging technologies to address the problem has also increased.

Read More

Phishing Campaigns Require a Proactive Approach to Security

Intruders Thrive on Complacency.

When it comes to the threat landscape, nothing makes information security teams shudder more than complacent users, whether they be employees, partners, vendors, or customers. Yearly security and awareness trainings have become all the rage (rightly so), helping to check off boxes on company compliance audits. However, all too often, new users or even seasoned veterans can be caught off-guard and open the door to evildoers.  

Read More

CEOs Must Understand Your Information Security Program


In the first installment of our series on security and the CEO, we discussed the dangerous disconnect between the rosy view of security held by the C-suite and the much grimmer reality seen in the trenches of IT. Today, we’re going to talk about the consequences of executive overconfidence in your information security program.

Read More

Your Information Security Situation: Does Your CEO Know the Truth?


The digital transformation of the last two decades has placed cybersecurity front and center on the CEO agenda. Customers now place vast quantities of personal information into the hands of businesses, with the expectation of a certain amount of privacy and confidentiality in exchange. The ability to meet this expectation is crucial in order for a business to retain customers and build its brand.

Read More

5 Information System Security Predictions for 2017


So, what does 2017 have in store for the security industry? While there’s no crystal ball that can tell us for sure, we’ve got our eye on a few key trends.

Entering a new year, we always take a look at what the latest in identity and access management  (IAM) and cybersecurity threats means for the security industry. This year, we specifically focused on answering three key questions:

Read More

What Does Accenture’s Cybersecurity Report Mean for Businesses?


A recent survey conducted by Accenture found that over the past year, roughly one in three targeted attacks resulted in an actual security breach. When you consider that the average company faces more than one hundred focused attacks launched against them every year, these numbers are alarming. This equates to more than 30 successful data breaches every year against a single company, with just one data breach having the potential to result in millions of dollars in losses.

Read More

Corporate Governance is More Than a Good InfoSec Policy

*Disclaimer: This article originally appeared on IDG Connect

Over the past few years, Governance, Risk, and Compliance (GRC) have become three of the hottest topics in Information Technology circles. The growing demand for compliance with federal and state laws, as well as industry best practices, has necessitated a closer look at IT governance, as well as solutions that help to ensure an organization has invested their time and efforts wisely, through management and implementation of such technologies as access control, data protection, and identity provisioning and management. Proper design, application, and usage of these key technologies (and others) help to control necessary risk management activities and ease the efforts that are required to remediate or address areas where compliance is lacking. 

Read More

5 Signs You Need to Upgrade Your Legacy IAM

*Disclaimer: This article originally appeared in SecurityWeek

IT leadership is a constant balancing act, especially as you must look for ways to advance your department as an engine for growth rather than a cost center. Unfortunately, time and resources for revenue-stimulating, strategic IT initiatives are often in short supply, thanks to the demands of mundane, but critical, day-to-day tasks. Of the day-to-day tasks that often become major resource drains, user identity and access management (IAM) is not only one of the most crucial to get right, but can also be one of the most problematic.

Read More

6 Things Schools Can Do to Ensure Student Data Privacy

*Disclaimer: This article originally appeared in eSchool News

Student data privacy is quite a different topic from the headlines most people read concerning data breaches. It is not about malicious intruders hacking or stealing credentials to get into a system to steal corporate intellectual property or records to sell on the dark web. Student data privacy concerns, specifically, center on the misuse of personally identifiable information, known by its acronym PII.

Read More

Subscribe Here!