Mobile Search Mobile Menu

Wednesday, September 20th, 2017 | By Jayne Hallock

New! “Check Your Armor” Cybersecurity eBook

Our new 12 page eBook is a great way to find any gaps in your enterprise’s cybersecurity armor. Chapter 1:  Check For Common Mistakes (Including the The ’1, 2, 3, 4, Open Door’ Mistake, The ‘I Thought They Still Worked Here’ Mistake and many more) Chapter 2: Check Your Perimeter (A checklist that covers your ease […]

Tuesday, September 19th, 2017 | By Jayne Hallock

Whitepaper: Keeping the Cyberwolves at Bay

Cybersecurity, Identities, People & Process: A Crucial Integration for the Modern Identity SOC One area of cybersecurity that’s often overlooked – or treated as an afterthought – is identity security. This could be a costly mistake. More specifically, traditional network edge tools can’t protect you anymore as workloads and company data exist on-premise and in the […]

Monday, September 18th, 2017 | By Jayne Hallock

Cut the Complexity: How to Mainstream Your IAM

Mobility means freedom. Mobility means options and flexibility and mobility means the future of business. Unfortunately, mobility also means risk. Chief among these risks is the risk of unauthorized access from within an organization by a nefarious intruder who gains access to sensitive systems via gaps in identity security. Identity and Access Management (IAM) protects businesses […]

Tuesday, September 12th, 2017 | By Jayne Hallock

The Equifax Breach: How to Educate Yourself

The recent Equifax breach is one of the largest and most stunning breaches we’ve seen. Although cybersecurity is a complex and completely unpredictable topic, we thought we should weigh in on the basic facts and provide our readers a curated list of interesting, informed further research. First, some facts. According to the FTC, the “The breach […]

Wednesday, September 6th, 2017 | By Jayne Hallock

Think Twice, Insiders: 5 Ways Access Governance Is a Menace to Insider Threats

Security threats are everywhere. Yes, even to companies with the best firewalls and intrusion prevention systems. That’s because no matter how much your data security guards against breaches, your greatest vulnerability lies within your perimeter. It lies with your people. Insider threats are a rising concern for data and cloud security, and for good reason. […]

Thursday, August 31st, 2017 | By Shawn Keve

People, Get Ready: GDPR’s Big Changes & How to Prep for Them

Seems that all anyone in the cybersecurity business can talk about these days is the General Data Protection Regulation (GDPR.) And with very good reason! As our CISO Paresh already so articulately explained – the GDPR is a far-reaching set of new regulations, with some pretty dire consequences for those who are found non-compliant. So […]

Thursday, August 24th, 2017 | By Jayne Hallock

Know Your Numbers: Why IAM Analytics Really Matter

It really is a jungle out there. Leading analysts predict that cybercrime costs will skyrocket to $2 trillion per year by 2019.  You know you have to protect your business and that’s why you likely have already invested in IAM solutions to protect your data from unauthorized access, while trying to stay one step ahead […]

Monday, August 21st, 2017 | By Jayne Hallock

First, Again: Simeio Makes the RSA Archer Connection!

Have you connected your Archer today? Simeio has! We don’t mean to brag – but Simeio nabbed another “first” and we’re thrilled to be able to say so. In fact, we’re going to be presenting on this first at RSA Techfest this week! So what exactly did we accomplish? Without getting too technical, we were […]

Friday, August 18th, 2017 | By Jayne Hallock

Simeio Nominated as RSA’s Overall Partner of the Year!

We’re thrilled to say the words “It’s an honor to be nominated!” This month, RSA announced that Simeio Solutions has been nominated for their prestigious “Americas Partner of the Year” for 2016-2017. As if that wasn’t exciting enough, we were nominated in the Overall Partner of the Year category. The winners will be announced in Orlando on September […]

Thursday, August 17th, 2017 | By Darren Calman

Follow The Puck: The Future of Cybersecurity Challenges

Like most people I know, I always make time to read about my industry. Not only to educate myself, but to keep on top of any emerging trends that might impact my business.  I’m not a huge hockey fan, but I do like this quote from Wayne Gretzky: “I skate to where the puck is […]

1 2 3 4 5