Mobile Search Mobile Menu

By Christina Czeschik

Almost Perfect? Multi-factor authentication with biometrics

Two-factor and multi-factor authentication – the latest trend in identity and access management (IAM). The answer to all our cybersecurity prayers. The newest, hottest trend. Or is it? Actually, some would say it’s been around for centuries. After all, what methods have humans been using to recognize each other since the dawn of time? Not […]

By Jayne Hallock

Cut the Complexity: How to Mainstream Your IAM

Mobility means freedom. Mobility means options and flexibility and mobility means the future of business. Unfortunately, mobility also means risk. Chief among these risks is the risk of unauthorized access from within an organization by a nefarious intruder who gains access to sensitive systems via gaps in identity security. Identity and Access Management (IAM) protects businesses […]

By Jayne Hallock

Understanding Identity Policies: 5 Best Practices

As an increasing number of organizations are required to comply with industry regulations, the need for access governance has grown. Through access governance, IT and security management can reduce the risks associated with incorrect or unnecessary end user access to sensitive data. The best way to keep your network secure is to ensure that the […]

By Jayne Hallock

New! “State of Identity” podcast about Privileged Account Management trends

In this educational new “State of Identity” podcast, host Cameron D’Ambrosi leads Simeio’s own Shawn Keve and Abhimanyu Yadav in a discussion about Privileged Identity Management. This enlightening thirty minutes covers: ~ Why privileged account management is different – and more vulnerable – than end user identity management ~ How the definition of PIM is […]

By Jayne Hallock

The Top 5 Mistakes That Threaten Your Security

“Mistakes were made” may be the most common PR response coming from an enterprise, when their security has been breached. It’s also the most  diplomatic…and least helpful response.  Why couldn’t these mistakes been spotted much earlier? Before PR spin was ever needed? Following a data breach, hack or other compromise to infrastructure or assets, a post-mortem […]

By Jayne Hallock

May I CIAM Your ID? 8 Tips for a Wildly Successful Consumer IAM Implementation

There’s a new IAM in town. A hipper, often fancier IAM. It’s called customer identity and access management (CIAM). And it’s helping all kinds of businesses improve their bottom lines, each and every day. What’s CIAM and why should you care? CIAM handles not only internal IAM (the identity and access management for your employees, […]

By Jayne Hallock

How to Stay Off CNN: 5 Ways To Rethink IAM (& Avoid Security Breaches)

Every business worries about it these days.  Some lose sleep over it. All across the globe, in every industry,  people are anxious that one fateful day, they’ll see their company name on TV. They fear that sickening feeling of hearing their business discussed on CNN, for all the wrong reasons.  Finally getting great free PR…for […]

By Jayne Hallock

Meet the Next Generation of Cyber Warriors, Part Three of Three

This Spring, we attended the Southeast Regional Cyber Defense Competition, hosted at nearby Kennesaw college. For two grueling days, teams of college students faced off against fake hackers that were attempting to compromise each team’s fake company. Exhausting, exhilarating, endless challenges. After the competition closed out, everyone met for a delicious and de-stressing luncheon. There […]

By Abhi Yadav

Meet the Next Generation of Cyber Warriors, Part Two of Three

In April, we were lucky enough to attend (and co-sponsor with our friends at EC Council) the Southeast Regional Cyber Defense Competition. There, we met and interviewed a few of what we like to call the “Next Generation of Cyber Warriors.” (You can read our first profile of Cyber Warrior Heather Lawrence here.) Now let’s […]

1 2 3 4 5 6