Quantcast
Channel: Multi-factor Authentication – Secure Thinking by Centrify
Browsing all 144 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What is Adaptive Authentication?

Adaptive Authentication: Why Should You Care? Before going into what adaptive authentication is I want to answer why you should care first. In today’s IT world, relying on a simple username and...

View Article


Image may be NSFW.
Clik here to view.

PWN2OWN 2017 Outcome: Implement Multi-factor Authentication & Least Privilege

Zero Day Initiative, a security research program that offers rewards for successful hacks, reported that on last day of their recent “PWN2OWN 2017” competition, a team of contestants pulled off an...

View Article


Image may be NSFW.
Clik here to view.

Password Vaults Alone Are Not Enough to Stop the Breach

A recent Forrester study examined four levels of identity and access management (IAM) maturity and found a direct correlation between the number of privileged identity management (PIM) best practices...

View Article

Image may be NSFW.
Clik here to view.

Verizon 2017 DBIR: Key Takeaways

Summary The 2017 DBIR is an essential read for organizational leaders, cybersecurity practitioners and security industry professionals. The report provides clear information that helps cyber security...

View Article

Image may be NSFW.
Clik here to view.

Verizon’s 2017 DBIR: You are Letting Hackers In

Verizon’s 2017 Data Breach Investigation Report (DBIR) just came out and it states that last year, “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” This is up from the...

View Article


Image may be NSFW.
Clik here to view.

Don’t Open that Google Doc Link: Another Phishing Scam

Yesterday, Google users were targeted by a spear phishing campaign that some cybersecurity researchers believe to be one of the fastest-spreading attacks of its kind in history. This attack was highly...

View Article

Image may be NSFW.
Clik here to view.

Déjà vu! Verizon Reports Compromised Credentials Are (by far) the Leading...

Another year has gone by and the words from the 2016 Verizon Data Breach Investigations Report (DBIR) still ring true: “We’re not mad, just disappointed.” The 2017 Verizon Data Breach Investigations...

View Article

Image may be NSFW.
Clik here to view.

How Can User Behavior Analytics Kill the Password?

Last time, I wrote about adaptive authentication and briefly touched on behavior analytics being an integral part of adaptive authentication. For true behavior analytics, you need some smart AI powered...

View Article


Image may be NSFW.
Clik here to view.

Controlling Access is the Key to Cyber Security

Access is the greatest opportunity and the greatest threat for businesses engaging with the online economy. Increasingly, our business systems gather, digest and disperse data throughout our...

View Article


Image may be NSFW.
Clik here to view.

Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to...

The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can’t...

View Article

Image may be NSFW.
Clik here to view.

Time to Ditch Passwords: Taking the Centrify Message to Infosecurity Europe

London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe show. With over 13,000 visitors expected over the three days,...

View Article

Image may be NSFW.
Clik here to view.

Mobile Device Management: Your Phone or Mine?

My phone currently sits in my pocket, and as I write this blog, it vibrates silently — reassuring me that I have not lost it, providing updates from friends and family and reminding me of emails and...

View Article

Image may be NSFW.
Clik here to view.

Infosecurity Europe 2017: Workplace Distraction Is a Major Security Risk, So...

From Yahoo to TalkTalk, and Wonga to Kmart, wherever you look today data breaches dominate the headlines. In fact, organisations are urged to assume it’s a case not of “if” but “when” they’re hit, and...

View Article


Image may be NSFW.
Clik here to view.

Driving Cloud-Based Agility at Rémy Cointreau with Centrify

Business requirements and information security priorities have always had a tough time aligning. It’s even become something of a cliché these days to say that security is a block on agility,...

View Article

Image may be NSFW.
Clik here to view.

Centrify Named a Leader in the KuppingerCole Privilege Management Leadership...

KuppingerCole just released the KuppingerCole Privilege Management, Leadership Compass. And I am excited to announce that Centirfy has been named a Leader! Centrify’s privileged access security...

View Article


Image may be NSFW.
Clik here to view.

Centrify named “Overall Leader” in KuppingerCole IDaaS Leadership Compass

Centrify is pleased to announce that KuppingerCole Identity as a Service (IDaaS) Leadership Compass Report names Centrify “Overall Leader.” The report also highlights Centrify’s leadership in...

View Article

Image may be NSFW.
Clik here to view.

Racing Towards a Zero Trust Access Control Model

Drag racing. From 0 to 60 in less than 2 seconds. It’s all about controlled speed. Success depends on maximizing power, minimizing weight and drag, and no obstacles in the way! In IT when the...

View Article


Image may be NSFW.
Clik here to view.

Post-Brexit Data Flows: Why There’ll be No Place for UK Firms to Hide from GDPR

As with most aspects of the EU, unhindered cross-border data flows are something most U.K. firms just take for granted these days. Thanks to the cloud, huge volumes of corporate data is stored in third...

View Article

Image may be NSFW.
Clik here to view.

6 Reactions to the Cisco 2017 Midyear Cybersecurity Report: Part 1

When reading this year’s “Cisco Midyear Cyber Security Report,” a few things jump out that bear discussion. Vendor Consolidation First, one of the key findings is related to the “fragmented security...

View Article

Image may be NSFW.
Clik here to view.

Winter Has Come for Passwords

The recent security breach at HBO of confidential data including Game of Thrones scripts, cast personal details and administrator passwords highlights the vulnerability of password-only protection. The...

View Article
Browsing all 144 articles
Browse latest View live