Will Financial Services Move to the Cloud?
Will financial services move to the cloud? This question has been asked so many times its surprising the answer still surprises so many people. Beginning with the arrival of Shadow IT services,...
View ArticleUh Oh, Yahoo Breach Hits 1 Billion User Accounts
Could this be the catalyst for change to end hacks? Compromised enterprises face huge barriers to rebuilding customer trust and brand reputation. And for Yahoo, this may be an insurmountable task. In...
View Article3 Ways to Ensure You Are Not the Next Company Breached
There is a superstition that bad things happen in “threes.” This month, we mourned the loss of three national icons — Astronaut, John Glenn, Actor, Alan Thicke and TNT Sideline Reporter, Craig Sager....
View ArticleWhy Organizations Need Adaptive Multi-factor Authentication (MFA)
We hear about high profile security breaches frequently. Most of these breaches exploit the system login credentials of end users to get into the company’s network. Leading organizations are...
View ArticleSingle-factor Authentication (SFA) vs. Multi-factor Authentication (MFA)
This blog will discuss the what single-factor authentication (SFA), two-factor authentication (2FA) and multi-factor authentication (MFA) are, and why more than one factor of authentication is vital to...
View ArticleWill “Security Fatigue” Inevitably Overwhelm Your Organization?
“Security fatigue” is a growing concept within cybersecurity circles: experts report that the sustained threat of malicious attacks is causing end users to feel defenseless and hopeless. There’s a...
View ArticleGmail Phishing Attack Reinforces that 2FA is the Cyber-Safety Belt We All Need
It is time to shift from a single password to multi-factor authentication A new phishing scam designed to steal login credentials from Gmail customers is making headlines this week. And once again, we...
View ArticleCentrify Co-Chairs the 2017 ICIT Winter Summit
Once again, we find ourselves at that stage in the political cycle when the new administration is taking office. That means a revised look at everything — from the economy, to the markets, to the...
View ArticleCentrify Supports Data Privacy Day: Take Action Today to Protect Your Privacy!
Centrify is proud to be a Data Privacy Day Champion because we work tirelessly each day to protect our customers and their data privacy. We believe that all of us, whether at work or as consumers,...
View ArticleDoes Multi-Factor Authentication Have to Be Difficult?
Before we go into how Multi-factor authentication (MFA) has changed, let’s have a quick look at what MFA is. With MFA, users must provide two or more “factors” of authentication when they access...
View ArticleCommission on Enhancing National Cybersecurity: Implement MFA
At the end of 2016, the Commission on Enhancing National Cybersecurity, a nonpartisan committee charged with developing actionable recommendations for securing and growing the digital economy,...
View ArticlePass(word)ing the buck!
The start of the New Year is always an interesting time in the security community. Out come the statistics and stories about the worst passwords and the most common ones chosen by online users during...
View ArticleAnnouncing Centrify’s New Analytics Service
After about two years of incredible hard work from the Centrify team, I am excited to announce the Centrify Analytics Service! Our goal for Centrify Analytics Service is to extend the Centrify Identity...
View ArticleNational Cyber Security Centre Opens: Why UK Firms Need to Rethink IAM
Today the UK’s National Cyber Security Centre (NCSC) opened to great fanfare. But it will have its work cut out to fulfil its mission of making the UK “the safest place to live and work online.” UK...
View ArticleRSA: Centrify Survey Reveals Almost Half of Respondents Lack Confidence in...
Yesterday, we conducted an onsite survey of IT professionals attending the RSA Conference, being held this week at Moscone Center, San Francisco. The poll asked respondents how their companies secure...
View ArticlePonemon 2017 Report: The Need for a New IT Security Architecture
It’s annual cybersecurity reporting season and first up in 2017 is the Ponemon Global Study, “The Need for a New IT Security Architecture” sponsored by Citrix. The study reveals global trends in IT...
View ArticleFederated Identity Management vs. SSO
Last time I wrote about how much it costs to protect yourself, so I want to follow up with another topic that hits close to home: your wallet. Federated identity management (FIM) and single sign-on...
View ArticleTop 3 Takeaways from the 2017 RSA Conference
Last week was the 2017 RSA Conference in San Francisco. Having attended, I can report that the number of vendors at the conference was nothing short of mind-boggling. While there are many challenges...
View ArticleNew Trend in the Security Space: Customers Want Vendor Consolidation and a...
Starting late last year, I kept on hearing a growing drumbeat from customers that they were highly interested in consolidating the breadth of security vendors and products that they use internally to...
View ArticleIt’s About Time (For Compliance with PCI DSS 3.2) — Are You Ready?
2017 hit the ground running in a fast and furious way, for obvious reasons. But wait a second — it’s suddenly March?!? Events and deadlines that seemed far into the future are suddenly right around the...
View Article