Mobile Search Mobile Menu

By Suhani Chamankar

Augmenting AI in IAM

Augmenting AI in IAM “In the here and now, artificial intelligence & machine learning — is still something new that often goes unexplained or under-examined. In the future, it’ll be so normal you won’t even notice”  — The Verge, James Vincent  2019  Artificial Intelligence (AI), unlike traditional Identity and Access Management (IAM) domains, is under-examined and changing the shape of […]

By Simeio Solutions

Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series”

Spotlight on Simeio’s May 20th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its most recent “Ask Me Anything Coffee Talk Series”. The topic was “Why do I need IAM? How do I get started? IAM for the Lost.” The session hosts were Vikram Subramanian, VP of Solutions at Simeio Solutions, and Anne […]

By Simeio Solutions

Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series”

Highlights of Simeio’s May 13th “Ask Me Anything Coffee Talk Series” Last Wednesday, Simeio held its latest “Ask Me Anything Coffee Talk Series”. The topic was “IAM Roadmapping.” The session hosts were Batool Aliakbar, Director of Delivery at Simeio Solutions, and Neda Pitt, VP of Information Security at Cisco. Here are some highlights from the […]

By Simeio Solutions

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series

Simeio Introduces “Ask Me Anything” Interactive Weekly Talk Series With the impact of the COVID-19, technology conferences, tradeshows, product launches, and other face-to-face events will be greatly scaled-down, even after the pandemic is over. That’s why Simeio is launching this ongoing virtual interactive talk series.  We invite you to join us, as we launch our […]

By Simeio Solutions

These Are the Biggest Cyber Threats Your Company Will Face in 2019

More than half of American companies have experienced a cyber attack that took an average of 68.9 days to solve. The cybersecurity landscape is constantly changing in response to new threats, which are on a steady rise. But both new and old cybersecurity risks threaten your operations and your profits. If you’re a business owner, the best way […]

By Michael Harvell

How to Avoid a Data Breach Through Effective Privileged User Management

Avoid a Data Breach Through Privileged User Management According to a study by Forester, up to 80 percent of data breaches are attributed to misuse or abuse of privileged credentials. This is because many organizations tend to overlook the importance of managing and securing their super accounts or administrator accounts. Like other users and typical IT workers, […]

By Tim Jester

7 Reasons Why Identity Administration is Your Best Protection

Thinking about investing in identity administration services? Read on for 7 reasons why identity administration is your best protection online. Companies today have more IT concerns than ever before. Nearly every employee at most firms needs some kind of user account and data access. The real problem becomes how you manage to create these accounts […]

By Tim Jester

5 Threats to Cloud Security (and the Cloud Security Strategies That’ll Keep Your Data Safe)

Cloud computing is a vital development that is central to our technology-focused future. But lax cloud security strategies can bring entire systems to their knees. The cloud has already proved to be a transformative technology across many sectors, and its influence is spreading quickly. This means that the need to know how to protect cloud-based data […]

access governance

By Tim Jester

Access Governance: What Is It & Why Do You Need It?

“Where should I put this big box of sensitive and business-critical documents? I’ll just leave them in the middle of the office for everyone to look at while I pop out. Should be fine.” Words you’d never hear in an office block. Any sensible manager knows that it’s not just about the risk of office theft, […]

1 2