Russian Hackers Target World Anti-Doping Agency in Latest Breach
What Happened: A Russian cyber espionage group known by the name of Tsar Team, also calling itself Fancy Bear, were successful in illegally hacking the World Anti-Doping Agency (WADA). The Anti-Doping...
View ArticleThe Government Cloud is Coming
If you’re like me, you’ve been hearing the phrase, “the cloud is coming” for years before you ever learned that winter was too. I never read any of the books, which first came out in 1996, so it wasn’t...
View ArticleMulti-factor Authentication Solutions: Only as Strong as the Weakest Link
I’m going to stray slightly from the teaching aspect of my blogs to some recent revelations in the technology industry, specifically regarding multi-factor authentication (MFA). Unfortunately, this...
View ArticleNational Cybersecurity Awareness Month: Lock Down Your Login
I just found out that October is “National Cyber Security Awareness Month.” Being in the security industry and seeing all the bad cybersecurity practices out there on a daily basis, I think every day...
View ArticleCentrify Joins Forces with Stop. Think. Connect™
I am excited to blog about our new association with the global cybersecurity awareness campaign STOP. THINK. CONNECT.™, which teaches digital citizens how to stay safer and securer online. Centrify...
View ArticleHow To Prevent Cybercrime: CFO Insights for Mid-Market and SMB Companies
Cybersecurity Risk From the Break Room to the Board Room How can CFO’s enable an organization to effectively combat cybercrime, while reducing IT security budgets? If this sounds too good to be true,...
View ArticlePodesta Twitter Hack: A(nother) Lesson on Two-Factor Authentication
In the midst of the WikiLeaks’ release of thousands of emails purportedly from his inbox, Hillary Clinton Campaign Chairman John Podesta has now become the victim of a hack into his Twitter account....
View Article3 Ways to Prove Identity & Combat Cybercrime: National Cybersecurity...
The Secret to Security What if I told you that the secret to security was just one, simple and attainable thing? Fort Knox is the de facto standard of security. It has granite walls that are four feet...
View ArticleHow Centrify Can Help AWS Customers Comply with New HIPAA CSP Regulations
New HIPAA regulations are driving heightened security around electronic protected health information (ePHI) and Cloud Service Providers (CSP). These regulations detail the types of security for data in...
View Article5 Critical Topics in Cybersecurity Training
With European Cybersecurity Month in full swing, this week’s topic of discussion is “Cybersecurity Training.” Whilst cybersecurity training and awareness has undoubtedly improved, a common mistake is...
View ArticleWindows 2FA – It’s a Big “Where” In “Everywhere”
If you’re a regular reader of our blog, you’ll know that here at Centrify, we’re big believers in multi-factor authentication (MFA) and strong supporters of MFA Everywhere. Passwords don’t protect us,...
View ArticleFive Steps to Stay Secure in the Mobile Age
Least surprising note of the day: I am a huge geek. See my picture up there? Nerd beard. Enough said. My current geek obsession is focused on mobile devices. I just upgraded my fantastic and near-new...
View ArticleHow the Centrify Identity Platform Solves the IT Frankenstein Nightmare
In the novel Frankenstein, by Mary Shelly, Victor Frankenstein embarks on a quest to create life by using dead body parts, “collected bones from carnel-houses.” In the novel, the monster is totally...
View ArticleHow to Avoid a Snowden-esque Security Breach at Your Company
What would happen to your company’s reputation or market share if its data was hacked? CREDIT: Getty Images This article originally appeared on Inc. Magazine and is reprinted with permission. The...
View ArticleModernizing Legacy Apps to Boost Security: Part I
The subject of modernizing apps has been around for years, but while talking to a partner organization recently, I was reminded that there are a number of companies with legacy apps that are just now...
View ArticleVeterans Day: My Transition from Artillery Officer to Identity Management...
As an Artillery Officer in the United States Army, I am tasked with the challenge of understanding the enemy, their assets and capabilities, and from what vectors they can and will attack. Based on...
View ArticleCybersecurity in 2016; predictions for 2017
It’s that time of year again. The holiday season is upon us and with it, online shopping will no doubt take another bite out of traditional brick-and-mortar holiday sales. With a colorful new president...
View ArticleDid a Lack of Common Sense Cybersecurity Just Elect Trump?
There is little debate that this election will be described as a referendum on the status quo, with very strong anti-establishment and anti-elitist sentiment driving record numbers of unexpected voters...
View ArticleAchievement Unlocked! Multi-factor Authentication Everywhere
I was recently talking to a CISO for a major airline. We had been discussing innovations in security, when he sighed and said that his budget was strong, but employees were overwhelmed by the constant...
View ArticleEU GDPR, Mandatory Data Breach Notification and How Centrify Helps
Breach notification rules in the upcoming EU GDPR (General Data Protection Regulation) will mean data breaches are far more likely to become public, where today it is possible (although probably...
View Article