Mobile Search Mobile Menu

By Christina Czeschik

Should we blockchain IAM?

From Buddhism to timeshares, from drones to cannabis farming: Blockchain is disrupting everything these days.  It seems…almost excessive? But IAM is different. Here, it makes perfect sense to employ a blockchain. How? Let’s take a look. Keeping users honest The central promise of the blockchain is simple. Within a community of people who don’t necessarily trust each […]

By Christina Czeschik

Hum@n Leader: QVC’s Angie Giardina

Welcome to our new series,  “Hum@n Leader”, where we introduce you to some of the most outstanding thought leaders in the IAM field. Our first profile is QVC’s IT Manager– Identity and Access Management, Angie Giardina. Angie’s gathered a very diverse range of experiences across many technologies, roles and industries. And yet despite of this wide range […]

By Jayne Hallock

A Very Sharey 2017: Editor’s Picks

As the Editor of Hum@n, I am constantly ‘taking the temperature’ of our readership. It’s important to me that we publish only compelling, interesting and ultimately useful content for you all. And there’s only one real way to measure what readers actually enjoy.  Counting “likes” can be an indicator but likes are easy and half the time – […]

By Jayne Hallock

Great Gartner! A Whirlwind WrapUp

Last week, The Simeio Crew descended on the 2017 Gartner IAM event, full of anticipation and excitement (and a lot of caffeine.)  Many of us attended  –  from the CEO and other executive leadership, to our industrious delivery team to our killer sales team. Even our content and social folks tagged along. And this event? Did not […]

By Jayne Hallock

The Breach Report: Whole Foods, Accenture & More

Extra, extra!  It’s a new edition of The Breach Report. As major breaches happen, we’ll skim for the most important data points from the most trusted resources and publish them here.  Here’s what’s happening in November… Whole Foods Breach Update: What’s Happened: You gotta watch those bells and whistles. The compromise didn’t happen in the […]

By Jayne Hallock

The Breach Report: Equifax & Deloitte

***Updated 10/24/207*** Is it irony, coincidence or a dark cosmic joke that some of the biggest security breaches we’ve ever seen are happening now? A.K.A. right when we’re celebrating National Cyber Security Awareness Month? We’re tempted to respond to the news of these breaches with a laundry list of advice and observations…but then we realized there’s enough […]

By Jayne Hallock

New! “Check Your Armor” Cybersecurity eBook

Our new 12 page eBook is a great way to identify any gaps in your enterprise’s cybersecurity armor. Find out if your staff is making the “1, 2, 3, 4, Open Door” mistake and learn what is involved in 80% of security breaches… Jayne HallockWith almost 20 years of writing and editing under her belt […]

By Jayne Hallock

Whitepaper: Keeping the Cyberwolves at Bay

Cybersecurity, Identities, People & Process: A Crucial Integration for the Modern Identity SOC One area of cybersecurity that’s often overlooked – or treated as an afterthought – is identity security. This could be a costly mistake. More specifically, traditional network edge tools can’t protect you anymore as workloads and company data exist on-premise and in the […]

By Jayne Hallock

Cut the Complexity: How to Mainstream Your IAM

Mobility means freedom. Mobility means options and flexibility and mobility means the future of business. Unfortunately, mobility also means risk. Chief among these risks is the risk of unauthorized access from within an organization by a nefarious intruder who gains access to sensitive systems via gaps in identity security. Identity and Access Management (IAM) protects businesses […]

By Jayne Hallock

Know Your Numbers: Why IAM Analytics Really Matter

It really is a jungle out there. Leading analysts predict that cybercrime costs will skyrocket to $2 trillion per year by 2019.  You know you have to protect your business and that’s why you likely have already invested in IAM solutions to protect your data from unauthorized access, while trying to stay one step ahead […]

1 2 3