Quantcast
Channel: Multi-factor Authentication – Secure Thinking by Centrify
Browsing all 144 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Multi-factor Authentication (MFA) Debate

A recent FCW article authored by Derek Handova provides expert opinions from experienced and well respected “identity” professionals: Paul Grassi, Sr. Standards & Technology Adviser at NIST, Jeremy...

View Article


Image may be NSFW.
Clik here to view.

IAM Best Practices to Reduce Your Attack Surface

When I read the 2017 Verizon data breach report, I couldn’t help but notice that it would be relatively easy to reduce an attack surface by implementing a few best practices. Granted, that might mean...

View Article


Image may be NSFW.
Clik here to view.

Best Practices for Multi-factor Authentication (MFA)

These days, it’s pretty clear that to protect systems and data, organizations need to go beyond traditional perimeter defenses. Because most modern cyber-criminals exploit user credentials to get a...

View Article

Image may be NSFW.
Clik here to view.

Equifax Data Breach: Stock Drops More Than Five Percent

Equifax announced today that it was hit by a cyber security incident, potentially impacting 143 million consumers in the U.S. According to the company’s press release, “criminals exploited a U.S....

View Article

Image may be NSFW.
Clik here to view.

How to Hack Passwords: How Long Would It Take Your Grandmother To Do It?

(Hint: You Won’t Believe the Answer) My last article “Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)”, was about how hackers can obtain massive databases of...

View Article


Image may be NSFW.
Clik here to view.

How Do You Choose the Right IAM Solution? Here Are 4 Questions You Should Ask

Cloud based services dominate today’s world and over the past few years, delivering cloud based IAM solutions is no exception. The right solution can reduce risk, cut down costs and save time, but...

View Article

Image may be NSFW.
Clik here to view.

Gartner Privileged Access Management Market Overview 2017

Gartner just published their 2017 Market Overview guide for PAM, and it is a great read! The drivers for PAM are similar to last year’s, with a new emphasis on the need for “a comprehensive...

View Article

Image may be NSFW.
Clik here to view.

A Lesson in Secure Password Management from the Equifax Data Breach

Last week, Krebs on Security published an article “Ayuda! (Help!) Equifax Has My Data!” which reported “that an online portal designed to let Equifax employees in Argentina manage credit report...

View Article


Image may be NSFW.
Clik here to view.

Stay Secure With Day One Support for iOS 11 and macOS High Sierra

It’s that time of year again: time for all the latest and greatest from our friends in Cupertino. Last week, Apple released iOS 11 and this week Apple released the latest update for macOS, the 10.13...

View Article


Image may be NSFW.
Clik here to view.

4 Tips to Stay Safe Online for National Cybersecurity Awareness Month

Help! I Love the Internet, But My Identity and Data Are Up For Grabs — Should I Just Unplug?! In honor of National Cybersecurity Awareness Month, we at Centrify are doing what we can to help you to be...

View Article

Image may be NSFW.
Clik here to view.

Equifax Breach Shows Firms Still Aren’t Getting the Basics Right Ahead of...

As each week brings the 25 May 2018 deadline for GDPR compliance closer to hand, we seem to be faced with yet another report highlighting poor levels of preparedness among organisations. Recent...

View Article

Image may be NSFW.
Clik here to view.

Today’s Predictions for Tomorrow’s Internet: How To Keep Your Smart Devices Safe

When you first hire a personal assistant, they’re not all that helpful. Over time, they learn your daily routine, your needs and desires, and with that information, they make your life easier. Now,...

View Article

Image may be NSFW.
Clik here to view.

Three Discussions CISOs Should Expect When Attending CyberConnect

I’m really excited to announce that CyberConnect 2017 is nearly sold out! And, I’m even more excited to attend the 30+ keynotes and panels, and collaborate with over 40 thought leader speakers during...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Awareness Month: Protecting Critical Infrastructure from Cyber...

It is interesting and at times bewildering, that in the many years following the failures of 9/11, we still have not found a way to share threat intelligence information without exposing classified...

View Article

Image may be NSFW.
Clik here to view.

A Beginner’s Guide to Cybersecurity

Many people worry that cybersecurity involves a dark and dangerous domain full of unpredictable terrors and threats over which they have little control. The fact is that the greatest risks in the...

View Article


Image may be NSFW.
Clik here to view.

Zero-Trust Model: Never Trust, Always Verify

“Never trust, always verify” is the lingo floating around in the security world. It succeeds the traditional belief of “trust, but verify,” which places a fair amount of trust in the people and devices...

View Article

Image may be NSFW.
Clik here to view.

A Leader! Forrester Wave Names Centrify Leader For Identity-as-a-Service

Today Forrester Research released The Forrester Wave™: Identity-As-A-Service, Q4 2017. Evaluating the “seven vendors that matter”, Forrester named Centrify a Leader. Here at Centrify, we believe this...

View Article


Image may be NSFW.
Clik here to view.

Six Cybersecurity Questions for the C-Suite

Countless breaches of the past year demonstrate that C-suite executives and company directors must rethink their security. Earlier this year, Equifax saw its share price drop by 13 per cent within a...

View Article

Image may be NSFW.
Clik here to view.

Centrify Identity Services Now Available on AWS Marketplace

Boom! Centrify Identity Services are now available on AWS Marketplace. A big week for Centrify and its partnership with AWS. To recap: Centrify announced it is now an Advanced Technology Partner in the...

View Article

Image may be NSFW.
Clik here to view.

Six Months and Counting: How Standards and Frameworks Can Help GDPR Compliance

The theft of highly sensitive personal information on 57 million Uber drivers and customers in the Uber data breach — and its subsequent cover-up — is in many ways what the GDPR was invented for. Here...

View Article
Browsing all 144 articles
Browse latest View live