Mobile Search Mobile Menu

By Simeio Solutions

Promoting Diversity in the Workplace

Promoting Diversity in the Workplace Highlights from Simeio’s September 23rd “Ask Me Anything Coffee Talk Series”  This week we bring you another timely and informative Coffee Talk session. Last Wednesday’s topic was “Promoting Diversity in the Workplace”. The session hosts were Christie Pugh, Analyst Relations at Solutions at Simeio Solutions, and Kay Chopard Cohen, U.S. Ambassador at Women in Identity. Here are some session highlights.   What have you tried in the past, in an […]

By Suhani Chamankar

Augmenting AI in IAM

Augmenting AI in IAM “In the here and now, artificial intelligence & machine learning — is still something new that often goes unexplained or under-examined. In the future, it’ll be so normal you won’t even notice”  — The Verge, James Vincent  2019  Artificial Intelligence (AI), unlike traditional Identity and Access Management (IAM) domains, is under-examined and changing the shape of […]

By Simeio Solutions

Building an IAM Career Working from Home – Simeio

How to Build Your IAM Career Working from Home Simeio’s May 27th “Ask Me Anything Coffee Talk Series”- Building an IAM Career working from home Last Wednesday, Simeio held its most recent “Ask Me Anything Coffee Talk Series.” The topic was “Building an IAM Career Working from Home.” The session hosts were Shawn Keve, CRO […]

By Simeio Solutions

IAM for the Lost – Simeio

Why do I need IAM? How do I get started? IAM for the Lost. Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its most recent “Ask Me Anything Coffee Talk Series”. The topic was “Why do I need IAM? How do I get started? IAM for the Lost.” […]

By Simeio Solutions

Why and When You Need IAM Roadmapping – Simeio

IAM Roadmapping: Why, When and KPIs to Measure Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its latest “Ask Me Anything Coffee Talk Series”. The topic was “IAM Roadmapping.” The session hosts were Batool Aliakbar, Director of Delivery at Simeio Solutions, and Neda Pitt, VP of Information Security […]

By Simeio Solutions

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series With the impact of the COVID-19, technology conferences, tradeshows, product launches, and other face-to-face events will be greatly scaled-down, even after the pandemic is over. That’s why Simeio is launching this ongoing virtual interactive talk series.  We invite you to join us, as we launch our […]

By Simeio Solutions

These Are the Biggest Cyber Threats Your Company Will Face in 2019

More than half of American companies have experienced a cyber attack that took an average of 68.9 days to solve. The cybersecurity landscape is constantly changing in response to new threats, which are on a steady rise. But both new and old cybersecurity risks threaten your operations and your profits. If you’re a business owner, the best way […]

By Michael Harvell

How to Avoid a Data Breach Through Effective Privileged User Management

Avoid a Data Breach Through Privileged User Management According to a study by Forester, up to 80 percent of data breaches are attributed to misuse or abuse of privileged credentials. This is because many organizations tend to overlook the importance of managing and securing their super accounts or administrator accounts. Like other users and typical IT workers, […]

By Tim Jester

7 Reasons Why Identity Administration is Your Best Protection

Thinking about investing in identity administration services? Read on for 7 reasons why identity administration is your best protection online. Companies today have more IT concerns than ever before. Nearly every employee at most firms needs some kind of user account and data access. The real problem becomes how you manage to create these accounts […]

By Tim Jester

5 Threats to Cloud Security (and the Cloud Security Strategies That’ll Keep Your Data Safe)

Cloud computing is a vital development that is central to our technology-focused future. But lax cloud security strategies can bring entire systems to their knees. The cloud has already proved to be a transformative technology across many sectors, and its influence is spreading quickly. This means that the need to know how to protect cloud-based data […]

1 2