Mobile Search Mobile Menu

By Sean Rogers

Why digital transformations fail – it’s messy.

The year has come to a close more quickly than I would like and I find myself reflecting on the digital transformation projects I’ve been involved with over the past 12 months. This definitely was the year of digital transformation. It was everywhere – in the blogs, the IT press and on everyone’s lips. Tell […]

By Srikanth Rajan PMP, MSTM

Top 8 questions to ask before choosing your Identity and Access Management (IAM) Vendor

1. Does the vendor have the track record and scalability your organization requires?In a world where several big and small, service / product based companies are competing to get a piece of action in Identity and Access Management space, companies who have been around for a decade or so clearly have an edge in terms […]

By Jayne Hallock

Countdown to Compliance Part 4: GDPR Enforcement and Penalties

Note: This is the fourth of an ongoing series on GDPR. We’ll be preparing you all the way to May 2018 on topics like: Privacy Protection and Breach Notification, GDPR Compliance Strategies, GDPR Enforcement and Penalities, Potential GDPR Costs, GDPR Auditing and more. Subscribe using the button on the right and you’ll be updated when we post a […]

By Christina Czeschik

‘Tis the season (for identity theft)

A friendly holiday reminder: Time to ho – ho – hold tight to your identity. Hackers know that many of us are in online shopping-frenzy mode, submitting our payment card information over and over, sometimes several times a week. And they are poised to take advantage of this increased activity.   Consumers are at risk of losing more […]

By Christina Czeschik

Diversity in IAM: It takes all kinds

In almost every cliché, there’s a grain of truth. Let’s take, for example, the cliché of the cybersecurity professional: A 20- or 30-something male wearing a hoodie and a T-shirt bearing an obscure programming joke. One whose social interaction is mostly limited to eye-rolling behind users’ backs whenever they have committed yet another security blunder. Of […]

By Christina Czeschik

Winning The Talent War: Finding IAM Pros

Let’s face it: the phrase “Identity Administration and Government” does not send sexy shivers down the spine of the new university graduate. It doesn’t initially sound like the fast-lane to money, power and a corner office. In fact, to the aspiring white-hat hacker, it evokes the dreaded notion of working nine-to-five, in a fluorescent office, […]

By Christina Czeschik

Almost Perfect? Multi-factor authentication with biometrics

Two-factor and multi-factor authentication – the latest trend in identity and access management (IAM). The answer to all our cybersecurity prayers. The newest, hottest trend. Or is it? Actually, some would say it’s been around for centuries. After all, what methods have humans been using to recognize each other since the dawn of time? Not […]

By Jayne Hallock

Cut the Complexity: How to Mainstream Your IAM

Mobility means freedom. Mobility means options and flexibility and mobility means the future of business. Unfortunately, mobility also means risk. Chief among these risks is the risk of unauthorized access from within an organization by a nefarious intruder who gains access to sensitive systems via gaps in identity security. Identity and Access Management (IAM) protects businesses […]

By Jayne Hallock

Understanding Identity Policies: 5 Best Practices

As an increasing number of organizations are required to comply with industry regulations, the need for access governance has grown. Through access governance, IT and security management can reduce the risks associated with incorrect or unnecessary end user access to sensitive data. The best way to keep your network secure is to ensure that the […]

By Jayne Hallock

New! “State of Identity” podcast about Privileged Account Management trends

In this educational new “State of Identity” podcast, host Cameron D’Ambrosi leads Simeio’s own Shawn Keve and Abhimanyu Yadav in a discussion about Privileged Identity Management. This enlightening thirty minutes covers: ~ Why privileged account management is different – and more vulnerable – than end user identity management ~ How the definition of PIM is […]

1 2 3 4 5 6