Quantcast
Channel: Multi-factor Authentication – Secure Thinking by Centrify
Browsing all 144 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Why a Simple Password Reset is Not Enough

Recently, a number of Amazon account holders received e-mails proposing a password reset out of “an abundance of caution.” This was a result of routine monitoring, in which Amazon discovered a list of...

View Article


Image may be NSFW.
Clik here to view.

How to Cook Up a Great MFA Strategy

Have you ever attempted to assemble do-it-yourself furniture—or for that matter throw together a meal—without following the instructions or recipes closely? You end up with furniture that looks like it...

View Article


Image may be NSFW.
Clik here to view.

SAP Security and Cyberattacks Do Not Mix

Let’s face it — if you’re using SAP to run your business, you simply can’t afford to allow a cyberattack to affect your critical business application. Until now, security for SAP has not been at the...

View Article

Image may be NSFW.
Clik here to view.

2016 Verizon Data Breach Investigations Report (DBIR)

“We’re not mad, just disappointed.” This summarizes a lot of the conclusions made in the 2016 Verizon Data Breach Investigations Report (DBIR). This comprehensive report covers 100,000+ incidents,...

View Article

Image may be NSFW.
Clik here to view.

Centrify Announces Centrify Server Suite 2016.1

I’m happy to announce the general availability of Centrify Server Suite 2016.1. Server Suite is our flagship product for enterprise-ready privileged identity management (PIM). It’s a big part of our...

View Article


Image may be NSFW.
Clik here to view.

The End of VPN as We Know It

There are countless articles outlining the dangers of VPN and how this is a prime attack vector used by hackers. In an interesting article I was sent recently, Only a third of companies know how many...

View Article

Image may be NSFW.
Clik here to view.

Multi-factor Authentication: Simple Explanation For My 5 Year Old Niece

This is the third blog on my series of “A Simple Explanation for My 5 Year Old Niece.” Please check my other two blogs  Cloud Access Security Broker (CASB) Model: A Simple Explanation for My 5 Year Old...

View Article

Image may be NSFW.
Clik here to view.

Centrify Consumer Trust Survey: The Corporate Cost of Compromised Credentials

We recently conducted a survey to find out what happens to consumer trust when a business is breached. The study examined consumer attitudes toward corporate hacking, and surveyed 2,400 people across...

View Article


Image may be NSFW.
Clik here to view.

The Cows Have Come Home: Now is the Time to Implement Multi-Factor...

During our conversations with customers and prospects these days, the question of implementing multi-factor authentication (MFA) usually begins with “when do you plan to?” instead of “are you planning...

View Article


Image may be NSFW.
Clik here to view.

Centrify’s Derived Credentials Enables BYOD within the Government

Recently, when I was watching ESPN, it played a humorous bit involving NFL insider Adam Schefter’s kitchen shaking as if experiencing an earthquake, only instead it was just the cumulative rattling and...

View Article

Image may be NSFW.
Clik here to view.

The Difference Between Two and Many: Two-Factor and Multi-Factor Authentication

When I was a kid, I remember arguing with friends about… everything. I’m difficult that way. But in this specific argument, we were arguing about amounts. If I can recall, my seven-year-old stance was...

View Article

Image may be NSFW.
Clik here to view.

Securing Enterprise Identities For Dummies, Part 2

In part one of Securing Enterprise Identities For Dummies, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure which are increasingly cloud and mobile. We...

View Article

Image may be NSFW.
Clik here to view.

Bank Robbery and Ransomware Prevention Have This in Common

Imagine you are getting ready to commit a bank heist. You dress up in black and put on your Richard Nixon mask. You approach an area in the side ally, at night, where surveillance cameras don’t have a...

View Article


Image may be NSFW.
Clik here to view.

Cloudbound? How to Secure Your Migration to AWS

I’ve always enjoyed hearing grand stories of moving workloads to the cloud. This allows sharing resources you no longer have to manage and you gain access to all the processing power needed to finish...

View Article

Image may be NSFW.
Clik here to view.

Raise a Glass: Rémy Cointreau Chooses Centrify to Enable Secure Access to...

When it comes to some of the world’s finest Cognac and spirits, many of us turn to offerings from Rémy Cointreau. As one of the world’s leading alcoholic beverage brands, Rémy Cointreau employs 1,800...

View Article


Image may be NSFW.
Clik here to view.

What Pokémon Go Teaches Us About Reducing Cyber Risk in the Enterprise

Pokémon Go is all the rage with my three kids: a tween, a teen and a young adult. At first I didn’t get the appeal. I would ask them, “What is the point of Pokémon?” And, they would answer, “Daaaad,...

View Article

Image may be NSFW.
Clik here to view.

Multi-Factor Authentication – Going for Olympic Gold

At a very basic level, we are all searching for a gold medal at the end of each day, and what companies want for their employees is a defined method of authentication so that they can master their...

View Article


Image may be NSFW.
Clik here to view.

Why Your Organization Needs a Privileged Identity Management Solution

In the age of cybersecurity, some form of attack or breach for corporations and government entities is not a matter of if but of when, especially since the leading attack vector is compromised...

View Article

Image may be NSFW.
Clik here to view.

How to Avoid Rising Cyber Liability Insurance Costs

Insurance companies are getting tired of footing the bill for corporations who continue to get breached. Frequently, the result of these breaches are a result of either weak policies or someone not...

View Article

Image may be NSFW.
Clik here to view.

Securing Enterprise Identities For Dummies: Free Live Webinar

In previous blogs, “Securing Enterprise Identities For Dummies, Part One and Part Two,” I wrote extensively about how identity can provide a new layer of security for your organization. Identity can be...

View Article
Browsing all 144 articles
Browse latest View live