Spear Phishing on the Rise, but Help is on the Way! | Identity Automation
Identity Automation Blog
by
3w ago
A white paper released by PIXM highlights an alarming trend in cyberattacks targeting school districts across the United States. This document uncovers a significant uptick in spear phishing campaigns over the last two months, orchestrated by two notorious threat groups known as Tycoon and Storm-1575 ..read more
Visit website
Passwordless Authentication
Identity Automation Blog
by
3M ago
Passwords are one of the most confusing concepts in secure authentication for typical users ..read more
Visit website
What is ITDR (Identity Threat Detection Response)
Identity Automation Blog
by
3M ago
The past couple of decades have seen an immense evolution in the cyber threat landscape and how organizations and enterprises utilize IT. Threat actors develop new cyber exploitation techniques, and concurrently cybersecurity solution vendors develop new technologies and methodologies. Those new technologies and methodologies often get branded with a new acronym that soon became part of the vernacular of SOC analysts everywhere ..read more
Visit website
QR Codes are an Emerging Cyberattack Vector
Identity Automation Blog
by
5M ago
  It’s 2023, and QR codes have been ubiquitous for well over a decade now ..read more
Visit website
Protecting Your Institution from the Threat of Spear Phishing
Identity Automation Blog
by
7M ago
Spear phishing is one of the most potentially destructive types of cyberattacks ever ..read more
Visit website
Next-Generation Identity and Access Management: Empowering Your State's Education System with a Universal Identity Fabric
Identity Automation Blog
by
9M ago
  In the realm of education, where data drives innovation in student outcomes, security is paramount. Unfortunately, coordination and collaboration at state and local levels has been cumbersome and complex, which slows down improvements in both cybersecurity and student outcome innovation. It's time for a different approach to identity management among state education systems with identity and access management that overcomes the challenges of coordination and collaboration across districts, agencies and higher education institutions.  ..read more
Visit website
The Evolution of Technology and the Power of IAM
Identity Automation Blog
by Diana McGhee
10M ago
      My very first trip to a national technology conference was in 2005 when I attended NEC (now known as ISTE) in Philadelphia. I was invited to attend by Discovery Education because I was one of three winners of their “Win a Wireless Laptop” contest. They paid for my airfare and booked me at the Marriott Old City, where my love for the national technology conference, ISTE, was born.     ..read more
Visit website
Why Zero Trust Is the Foundation of a Strong K-12 Cybersecurity Program
Identity Automation Blog
by
1y ago
  ..read more
Visit website
Austin Independent School District Spotlight: Creating a Digital Ecosystem with “AISD Anywhere” Access
Identity Automation Blog
by
1y ago
As the fifth-largest public school district in Texas, Austin Independent School District (ISD) is guided by the motto “AISD Anywhere” to provide 100,000 students, teachers, and parents greater access to their EdTech tools ..read more
Visit website
Clayton County Public Schools Spotlight: Securing Access District-Wide
Identity Automation Blog
by
1y ago
As the fifth-largest school system in Georgia, Clayton County Public Schools (CCPS) has a history of delivering quality education to a diversity of students. When Chief Technology Officer Rod Smith stepped into his role nine years ago, there were no online systems for students to log in and access resources ..read more
Visit website

Follow Identity Automation Blog on FeedSpot

Continue with Google
Continue with Apple
OR