Why a Simple Password Reset is Not Enough
Recently, a number of Amazon account holders received e-mails proposing a password reset out of “an abundance of caution.” This was a result of routine monitoring, in which Amazon discovered a list of...
View ArticleHow to Cook Up a Great MFA Strategy
Have you ever attempted to assemble do-it-yourself furniture—or for that matter throw together a meal—without following the instructions or recipes closely? You end up with furniture that looks like it...
View ArticleSAP Security and Cyberattacks Do Not Mix
Let’s face it — if you’re using SAP to run your business, you simply can’t afford to allow a cyberattack to affect your critical business application. Until now, security for SAP has not been at the...
View Article2016 Verizon Data Breach Investigations Report (DBIR)
“We’re not mad, just disappointed.” This summarizes a lot of the conclusions made in the 2016 Verizon Data Breach Investigations Report (DBIR). This comprehensive report covers 100,000+ incidents,...
View ArticleCentrify Announces Centrify Server Suite 2016.1
I’m happy to announce the general availability of Centrify Server Suite 2016.1. Server Suite is our flagship product for enterprise-ready privileged identity management (PIM). It’s a big part of our...
View ArticleThe End of VPN as We Know It
There are countless articles outlining the dangers of VPN and how this is a prime attack vector used by hackers. In an interesting article I was sent recently, Only a third of companies know how many...
View ArticleMulti-factor Authentication: Simple Explanation For My 5 Year Old Niece
This is the third blog on my series of “A Simple Explanation for My 5 Year Old Niece.” Please check my other two blogs Cloud Access Security Broker (CASB) Model: A Simple Explanation for My 5 Year Old...
View ArticleCentrify Consumer Trust Survey: The Corporate Cost of Compromised Credentials
We recently conducted a survey to find out what happens to consumer trust when a business is breached. The study examined consumer attitudes toward corporate hacking, and surveyed 2,400 people across...
View ArticleThe Cows Have Come Home: Now is the Time to Implement Multi-Factor...
During our conversations with customers and prospects these days, the question of implementing multi-factor authentication (MFA) usually begins with “when do you plan to?” instead of “are you planning...
View ArticleCentrify’s Derived Credentials Enables BYOD within the Government
Recently, when I was watching ESPN, it played a humorous bit involving NFL insider Adam Schefter’s kitchen shaking as if experiencing an earthquake, only instead it was just the cumulative rattling and...
View ArticleThe Difference Between Two and Many: Two-Factor and Multi-Factor Authentication
When I was a kid, I remember arguing with friends about… everything. I’m difficult that way. But in this specific argument, we were arguing about amounts. If I can recall, my seven-year-old stance was...
View ArticleSecuring Enterprise Identities For Dummies, Part 2
In part one of Securing Enterprise Identities For Dummies, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure which are increasingly cloud and mobile. We...
View ArticleBank Robbery and Ransomware Prevention Have This in Common
Imagine you are getting ready to commit a bank heist. You dress up in black and put on your Richard Nixon mask. You approach an area in the side ally, at night, where surveillance cameras don’t have a...
View ArticleCloudbound? How to Secure Your Migration to AWS
I’ve always enjoyed hearing grand stories of moving workloads to the cloud. This allows sharing resources you no longer have to manage and you gain access to all the processing power needed to finish...
View ArticleRaise a Glass: Rémy Cointreau Chooses Centrify to Enable Secure Access to...
When it comes to some of the world’s finest Cognac and spirits, many of us turn to offerings from Rémy Cointreau. As one of the world’s leading alcoholic beverage brands, Rémy Cointreau employs 1,800...
View ArticleWhat Pokémon Go Teaches Us About Reducing Cyber Risk in the Enterprise
Pokémon Go is all the rage with my three kids: a tween, a teen and a young adult. At first I didn’t get the appeal. I would ask them, “What is the point of Pokémon?” And, they would answer, “Daaaad,...
View ArticleMulti-Factor Authentication – Going for Olympic Gold
At a very basic level, we are all searching for a gold medal at the end of each day, and what companies want for their employees is a defined method of authentication so that they can master their...
View ArticleWhy Your Organization Needs a Privileged Identity Management Solution
In the age of cybersecurity, some form of attack or breach for corporations and government entities is not a matter of if but of when, especially since the leading attack vector is compromised...
View ArticleHow to Avoid Rising Cyber Liability Insurance Costs
Insurance companies are getting tired of footing the bill for corporations who continue to get breached. Frequently, the result of these breaches are a result of either weak policies or someone not...
View ArticleSecuring Enterprise Identities For Dummies: Free Live Webinar
In previous blogs, “Securing Enterprise Identities For Dummies, Part One and Part Two,” I wrote extensively about how identity can provide a new layer of security for your organization. Identity can be...
View Article