Mobile Search Mobile Menu

By Jayne Hallock

The Breach Report: Whole Foods, Accenture & More

Extra, extra!  It’s a new edition of The Breach Report. As major breaches happen, we’ll skim for the most important data points from the most trusted resources and publish them here.  Here’s what’s happening in November… Whole Foods Breach Update: What’s Happened: You gotta watch those bells and whistles. The compromise didn’t happen in the […]

By Jayne Hallock

The Breach Report: Equifax & Deloitte

***Updated 10/24/207*** Is it irony, coincidence or a dark cosmic joke that some of the biggest security breaches we’ve ever seen are happening now? A.K.A. right when we’re celebrating National Cyber Security Awareness Month? We’re tempted to respond to the news of these breaches with a laundry list of advice and observations…but then we realized there’s enough […]

By Jayne Hallock

Agility & Metrics Lead to IAM Success: RSA Charge Presentation

(The following is excerpted from the description of an upcoming speaking session at RSA Charge, which will be presented by Matt Chambers – Principal, Security and Risk, Asurion, Gary Brown – Senior Manager, Global Security & Risk, Asurion  as well as Simeio’s own Project Manager and Sr. IAM Consultant Zubin Dumasia) In the real world there is always resistance to […]

By Jayne Hallock

Mind The Gap: Shrinking The Distance Between NOC And SOC

Companies cannot afford extended network downtime, any more than they can afford cybercriminal activity targeting systems running the business or their information assets. Unfortunately, enterprise security and performance teams rarely operate as holistically as the forces they’re fighting against.  As more senior leadership teams and boards of directors take an active interest in IT security […]

By Jayne Hallock

New! “Check Your Armor” Cybersecurity eBook

Our new 12 page eBook is a great way to identify any gaps in your enterprise’s cybersecurity armor. Find out if your staff is making the “1, 2, 3, 4, Open Door” mistake and learn what is involved in 80% of security breaches… Jayne HallockWith almost 20 years of writing and editing under her belt […]

By Jayne Hallock

Whitepaper: Keeping the Cyberwolves at Bay

Cybersecurity, Identities, People & Process: A Crucial Integration for the Modern Identity SOC One area of cybersecurity that’s often overlooked – or treated as an afterthought – is identity security. This could be a costly mistake. More specifically, traditional network edge tools can’t protect you anymore as workloads and company data exist on-premise and in the […]

By Jayne Hallock

Cut the Complexity: How to Mainstream Your IAM

Mobility means freedom. Mobility means options and flexibility and mobility means the future of business. Unfortunately, mobility also means risk. Chief among these risks is the risk of unauthorized access from within an organization by a nefarious intruder who gains access to sensitive systems via gaps in identity security. Identity and Access Management (IAM) protects businesses […]

By Jayne Hallock

The Equifax Breach: How to Educate Yourself

The recent Equifax breach is one of the largest and most stunning breaches we’ve seen. Although cybersecurity is a complex and completely unpredictable topic, we thought we should weigh in on the basic facts and provide our readers a curated list of interesting, informed further research. First, some facts. According to the FTC, the “The breach […]

By Jayne Hallock

Think Twice, Insiders: 5 Ways Access Governance Is a Menace to Insider Threats

Security threats are everywhere. Yes, even to companies with the best firewalls and intrusion prevention systems. That’s because no matter how much your data security guards against breaches, your greatest vulnerability lies within your perimeter. It lies with your people. Insider threats are a rising concern for data and cloud security, and for good reason. […]

By Jayne Hallock

Know Your Numbers: Why IAM Analytics Really Matter

It really is a jungle out there. Leading analysts predict that cybercrime costs will skyrocket to $2 trillion per year by 2019.  You know you have to protect your business and that’s why you likely have already invested in IAM solutions to protect your data from unauthorized access, while trying to stay one step ahead […]

1 2 3