What is Adaptive Authentication?
Adaptive Authentication: Why Should You Care? Before going into what adaptive authentication is I want to answer why you should care first. In today’s IT world, relying on a simple username and...
View ArticlePWN2OWN 2017 Outcome: Implement Multi-factor Authentication & Least Privilege
Zero Day Initiative, a security research program that offers rewards for successful hacks, reported that on last day of their recent “PWN2OWN 2017” competition, a team of contestants pulled off an...
View ArticlePassword Vaults Alone Are Not Enough to Stop the Breach
A recent Forrester study examined four levels of identity and access management (IAM) maturity and found a direct correlation between the number of privileged identity management (PIM) best practices...
View ArticleVerizon 2017 DBIR: Key Takeaways
Summary The 2017 DBIR is an essential read for organizational leaders, cybersecurity practitioners and security industry professionals. The report provides clear information that helps cyber security...
View ArticleVerizon’s 2017 DBIR: You are Letting Hackers In
Verizon’s 2017 Data Breach Investigation Report (DBIR) just came out and it states that last year, “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” This is up from the...
View ArticleDon’t Open that Google Doc Link: Another Phishing Scam
Yesterday, Google users were targeted by a spear phishing campaign that some cybersecurity researchers believe to be one of the fastest-spreading attacks of its kind in history. This attack was highly...
View ArticleDéjà vu! Verizon Reports Compromised Credentials Are (by far) the Leading...
Another year has gone by and the words from the 2016 Verizon Data Breach Investigations Report (DBIR) still ring true: “We’re not mad, just disappointed.” The 2017 Verizon Data Breach Investigations...
View ArticleHow Can User Behavior Analytics Kill the Password?
Last time, I wrote about adaptive authentication and briefly touched on behavior analytics being an integral part of adaptive authentication. For true behavior analytics, you need some smart AI powered...
View ArticleControlling Access is the Key to Cyber Security
Access is the greatest opportunity and the greatest threat for businesses engaging with the online economy. Increasingly, our business systems gather, digest and disperse data throughout our...
View ArticleDo You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to...
The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can’t...
View ArticleTime to Ditch Passwords: Taking the Centrify Message to Infosecurity Europe
London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe show. With over 13,000 visitors expected over the three days,...
View ArticleMobile Device Management: Your Phone or Mine?
My phone currently sits in my pocket, and as I write this blog, it vibrates silently — reassuring me that I have not lost it, providing updates from friends and family and reminding me of emails and...
View ArticleInfosecurity Europe 2017: Workplace Distraction Is a Major Security Risk, So...
From Yahoo to TalkTalk, and Wonga to Kmart, wherever you look today data breaches dominate the headlines. In fact, organisations are urged to assume it’s a case not of “if” but “when” they’re hit, and...
View ArticleDriving Cloud-Based Agility at Rémy Cointreau with Centrify
Business requirements and information security priorities have always had a tough time aligning. It’s even become something of a cliché these days to say that security is a block on agility,...
View ArticleCentrify Named a Leader in the KuppingerCole Privilege Management Leadership...
KuppingerCole just released the KuppingerCole Privilege Management, Leadership Compass. And I am excited to announce that Centirfy has been named a Leader! Centrify’s privileged access security...
View ArticleCentrify named “Overall Leader” in KuppingerCole IDaaS Leadership Compass
Centrify is pleased to announce that KuppingerCole Identity as a Service (IDaaS) Leadership Compass Report names Centrify “Overall Leader.” The report also highlights Centrify’s leadership in...
View ArticleRacing Towards a Zero Trust Access Control Model
Drag racing. From 0 to 60 in less than 2 seconds. It’s all about controlled speed. Success depends on maximizing power, minimizing weight and drag, and no obstacles in the way! In IT when the...
View ArticlePost-Brexit Data Flows: Why There’ll be No Place for UK Firms to Hide from GDPR
As with most aspects of the EU, unhindered cross-border data flows are something most U.K. firms just take for granted these days. Thanks to the cloud, huge volumes of corporate data is stored in third...
View Article6 Reactions to the Cisco 2017 Midyear Cybersecurity Report: Part 1
When reading this year’s “Cisco Midyear Cyber Security Report,” a few things jump out that bear discussion. Vendor Consolidation First, one of the key findings is related to the “fragmented security...
View ArticleWinter Has Come for Passwords
The recent security breach at HBO of confidential data including Game of Thrones scripts, cast personal details and administrator passwords highlights the vulnerability of password-only protection. The...
View Article