Mobile Search Mobile Menu

By Jayne Hallock

The Breach Report: Whole Foods, Accenture & More

Extra, extra!  It’s a new edition of The Breach Report. As major breaches happen, we’ll skim for the most important data points from the most trusted resources and publish them here.  Here’s what’s happening in November… Whole Foods Breach Update: What’s Happened: You gotta watch those bells and whistles. The compromise didn’t happen in the […]

By Christina Czeschik

Diversity in IAM: It takes all kinds

In almost every cliché, there’s a grain of truth. Let’s take, for example, the cliché of the cybersecurity professional: A 20- or 30-something male wearing a hoodie and a T-shirt bearing an obscure programming joke. One whose social interaction is mostly limited to eye-rolling behind users’ backs whenever they have committed yet another security blunder. Of […]

By Christina Czeschik

Winning The Talent War: Finding IAM Pros

Let’s face it: the phrase “Identity Administration and Government” does not send sexy shivers down the spine of the new university graduate. It doesn’t initially sound like the fast-lane to money, power and a corner office. In fact, to the aspiring white-hat hacker, it evokes the dreaded notion of working nine-to-five, in a fluorescent office, […]

By Abhi Yadav

Engaging Your Customer, Part One: Improving Your CIAM Design

In traditional enterprise IAM systems, Human Resources is the usual “system of record” for our individual users. HR files and logons are how we track our employees’ data. But when it comes to tracking our customers’ data, we often use several different systems, processes, agencies and social providers. Each with authority over certain identifying attributes of the individual. This is problematic. […]

By Christina Czeschik

Almost Perfect? Multi-factor authentication with biometrics

Two-factor and multi-factor authentication – the latest trend in identity and access management (IAM). The answer to all our cybersecurity prayers. The newest, hottest trend. Or is it? Actually, some would say it’s been around for centuries. After all, what methods have humans been using to recognize each other since the dawn of time? Not […]

By Jayne Hallock

The Breach Report: Equifax & Deloitte

***Updated 10/24/207*** Is it irony, coincidence or a dark cosmic joke that some of the biggest security breaches we’ve ever seen are happening now? A.K.A. right when we’re celebrating National Cyber Security Awareness Month? We’re tempted to respond to the news of these breaches with a laundry list of advice and observations…but then we realized there’s enough […]

By Jayne Hallock

Agility & Metrics Lead to IAM Success: RSA Charge Presentation

(The following is excerpted from the description of an upcoming speaking session at RSA Charge, which will be presented by Matt Chambers – Principal, Security and Risk, Asurion, Gary Brown – Senior Manager, Global Security & Risk, Asurion  as well as Simeio’s own Project Manager and Sr. IAM Consultant Zubin Dumasia) In the real world there is always resistance to […]

By Jayne Hallock

Mind The Gap: Shrinking The Distance Between NOC And SOC

Companies cannot afford extended network downtime, any more than they can afford cybercriminal activity targeting systems running the business or their information assets. Unfortunately, enterprise security and performance teams rarely operate as holistically as the forces they’re fighting against.  As more senior leadership teams and boards of directors take an active interest in IT security […]

By Jayne Hallock

New! “Check Your Armor” Cybersecurity eBook

Our new 12 page eBook is a great way to identify any gaps in your enterprise’s cybersecurity armor. Find out if your staff is making the “1, 2, 3, 4, Open Door” mistake and learn what is involved in 80% of security breaches…

By Jayne Hallock

Whitepaper: Keeping the Cyberwolves at Bay

Cybersecurity, Identities, People & Process: A Crucial Integration for the Modern Identity SOC One area of cybersecurity that’s often overlooked – or treated as an afterthought – is identity security. This could be a costly mistake. More specifically, traditional network edge tools can’t protect you anymore as workloads and company data exist on-premise and in the […]

1 2 3 4 5 6