Mobile Search Mobile Menu

By Shawn Keve

IDaaS Underpins PCI DSS Requirement 8 Compliance – Part 3

PCI compliance matters when managing identity and access for remote third-party service providers. This is the third article in an ongoing series on PCI DSS Requirement 8 compliance. In a nutshell, PCI Requirement 8 is about identifying and authenticating all users to protect data and systems. When you can identify every user, you can control […]

By Christina Czeschik

IAM 911: How Strong Healthcare IAM Can Save Lives

Badly implemented IAM can kill you. Literally. The above statement is not just a scare tactic – it is a fact that has been proven in healthcare, sadly, many times over. The central function of IAM is to grant reliable access – for example to patient data – to those who are authorized, and to […]

By Jayne Hallock

Countdown to Compliance Part 3: GDPR Compliance Strategies

Note: This is the third of an ongoing series on GDPR. We’ll be preparing you all the way to May 2018 on topics like: Privacy Protection and Breach Notification, GDPR Compliance Strategies, GDPR Enforcement and Penalities, Potential GDPR Costs, GDPR Auditing and more. Subscribe using the button on the right and you’ll be updated when […]

By Jayne Hallock

Countdown to Compliance Part 2: GDPR Privacy Protection & Breach Notification

Note: This is the second of an ongoing series on GDPR. We’ll be preparing you all the way to May 2018 on topics like: Privacy Protection and Breach Notification, GDPR Compliance Strategies, GDPR Enforcement and Penalities, Potential GDPR Costs, GDPR Auditing and more. Subscribe using the button on the right and you’ll be updated when […]

By Jayne Hallock

A Very Sharey 2017: Editor’s Picks

As the Editor of Hum@n, I am constantly ‘taking the temperature’ of our readership. It’s important to me that we publish only compelling, interesting and ultimately useful content for you all. And there’s only one real way to measure what readers actually enjoy.  Counting “likes” can be an indicator but likes are easy and half the time – […]

By Jayne Hallock

Countdown to Compliance Part 1: GDPR Requirements, Roles, and Reporting Timelines

Note: This is the first of an ongoing series on GDPR. We’ll be preparing you all the way to May 2018 on topics like: Privacy Protection and Breach Notification, GDPR Compliance Strategies, GDPR Enforcement and Penalities, Potential GDPR Costs, GDPR Auditing and more. Subscribe using the button on the right and you’ll be updated when […]

By Jayne Hallock

Great Gartner! A Whirlwind WrapUp

Last week, The Simeio Crew descended on the 2017 Gartner IAM event, full of anticipation and excitement (and a lot of caffeine.)  Many of us attended  –  from the CEO and other executive leadership, to our industrious delivery team to our killer sales team. Even our content and social folks tagged along. And this event? Did not […]

By Jayne Hallock

The Breach Report: Whole Foods, Accenture & More

Extra, extra!  It’s a new edition of The Breach Report. As major breaches happen, we’ll skim for the most important data points from the most trusted resources and publish them here.  Here’s what’s happening in November… Whole Foods Breach Update: What’s Happened: You gotta watch those bells and whistles. The compromise didn’t happen in the […]

By Jayne Hallock

The Breach Report: Equifax & Deloitte

***Updated 10/24/207*** Is it irony, coincidence or a dark cosmic joke that some of the biggest security breaches we’ve ever seen are happening now? A.K.A. right when we’re celebrating National Cyber Security Awareness Month? We’re tempted to respond to the news of these breaches with a laundry list of advice and observations…but then we realized there’s enough […]

By Jayne Hallock

Think Twice, Insiders: 5 Ways Access Governance Is a Menace to Insider Threats

Security threats are everywhere. Yes, even to companies with the best firewalls and intrusion prevention systems. That’s because no matter how much your data security guards against breaches, your greatest vulnerability lies within your perimeter. It lies with your people. Insider threats are a rising concern for data and cloud security, and for good reason. […]

1 2