The Multi-factor Authentication (MFA) Debate
A recent FCW article authored by Derek Handova provides expert opinions from experienced and well respected “identity” professionals: Paul Grassi, Sr. Standards & Technology Adviser at NIST, Jeremy...
View ArticleIAM Best Practices to Reduce Your Attack Surface
When I read the 2017 Verizon data breach report, I couldn’t help but notice that it would be relatively easy to reduce an attack surface by implementing a few best practices. Granted, that might mean...
View ArticleBest Practices for Multi-factor Authentication (MFA)
These days, it’s pretty clear that to protect systems and data, organizations need to go beyond traditional perimeter defenses. Because most modern cyber-criminals exploit user credentials to get a...
View ArticleEquifax Data Breach: Stock Drops More Than Five Percent
Equifax announced today that it was hit by a cyber security incident, potentially impacting 143 million consumers in the U.S. According to the company’s press release, “criminals exploited a U.S....
View ArticleHow to Hack Passwords: How Long Would It Take Your Grandmother To Do It?
(Hint: You Won’t Believe the Answer) My last article “Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)”, was about how hackers can obtain massive databases of...
View ArticleHow Do You Choose the Right IAM Solution? Here Are 4 Questions You Should Ask
Cloud based services dominate today’s world and over the past few years, delivering cloud based IAM solutions is no exception. The right solution can reduce risk, cut down costs and save time, but...
View ArticleGartner Privileged Access Management Market Overview 2017
Gartner just published their 2017 Market Overview guide for PAM, and it is a great read! The drivers for PAM are similar to last year’s, with a new emphasis on the need for “a comprehensive...
View ArticleA Lesson in Secure Password Management from the Equifax Data Breach
Last week, Krebs on Security published an article “Ayuda! (Help!) Equifax Has My Data!” which reported “that an online portal designed to let Equifax employees in Argentina manage credit report...
View ArticleStay Secure With Day One Support for iOS 11 and macOS High Sierra
It’s that time of year again: time for all the latest and greatest from our friends in Cupertino. Last week, Apple released iOS 11 and this week Apple released the latest update for macOS, the 10.13...
View Article4 Tips to Stay Safe Online for National Cybersecurity Awareness Month
Help! I Love the Internet, But My Identity and Data Are Up For Grabs — Should I Just Unplug?! In honor of National Cybersecurity Awareness Month, we at Centrify are doing what we can to help you to be...
View ArticleEquifax Breach Shows Firms Still Aren’t Getting the Basics Right Ahead of...
As each week brings the 25 May 2018 deadline for GDPR compliance closer to hand, we seem to be faced with yet another report highlighting poor levels of preparedness among organisations. Recent...
View ArticleToday’s Predictions for Tomorrow’s Internet: How To Keep Your Smart Devices Safe
When you first hire a personal assistant, they’re not all that helpful. Over time, they learn your daily routine, your needs and desires, and with that information, they make your life easier. Now,...
View ArticleThree Discussions CISOs Should Expect When Attending CyberConnect
I’m really excited to announce that CyberConnect 2017 is nearly sold out! And, I’m even more excited to attend the 30+ keynotes and panels, and collaborate with over 40 thought leader speakers during...
View ArticleCybersecurity Awareness Month: Protecting Critical Infrastructure from Cyber...
It is interesting and at times bewildering, that in the many years following the failures of 9/11, we still have not found a way to share threat intelligence information without exposing classified...
View ArticleA Beginner’s Guide to Cybersecurity
Many people worry that cybersecurity involves a dark and dangerous domain full of unpredictable terrors and threats over which they have little control. The fact is that the greatest risks in the...
View ArticleZero-Trust Model: Never Trust, Always Verify
“Never trust, always verify” is the lingo floating around in the security world. It succeeds the traditional belief of “trust, but verify,” which places a fair amount of trust in the people and devices...
View ArticleA Leader! Forrester Wave Names Centrify Leader For Identity-as-a-Service
Today Forrester Research released The Forrester Wave™: Identity-As-A-Service, Q4 2017. Evaluating the “seven vendors that matter”, Forrester named Centrify a Leader. Here at Centrify, we believe this...
View ArticleSix Cybersecurity Questions for the C-Suite
Countless breaches of the past year demonstrate that C-suite executives and company directors must rethink their security. Earlier this year, Equifax saw its share price drop by 13 per cent within a...
View ArticleCentrify Identity Services Now Available on AWS Marketplace
Boom! Centrify Identity Services are now available on AWS Marketplace. A big week for Centrify and its partnership with AWS. To recap: Centrify announced it is now an Advanced Technology Partner in the...
View ArticleSix Months and Counting: How Standards and Frameworks Can Help GDPR Compliance
The theft of highly sensitive personal information on 57 million Uber drivers and customers in the Uber data breach — and its subsequent cover-up — is in many ways what the GDPR was invented for. Here...
View Article