Quantcast
Channel: Multi-factor Authentication – Secure Thinking by Centrify
Browsing all 144 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Centrify Selected as a Box Trust Partner

Over the past few months, it seems Centrify can’t escape the winner’s circle. This all began with positive recognition from revered industry analyst firm Forrester when they positioned Centrify as...

View Article


Image may be NSFW.
Clik here to view.

What is Adaptive Multi-factor Authentication (MFA)?

In 2016 over $80B have been spent on Security, yet 66% of companies were still breached and 81% of breaches involved compromised credentials in the form of either stolen or weak passwords. I covered in...

View Article


Image may be NSFW.
Clik here to view.

5 Security Tips for Online Shopping in 2017

‘Tis the season of holiday cookies, warm sweaters hot cocoa and… holiday shopping deals. According to Deloitte, retailers can expect to see holiday sales growth as much as 4.5 percent and could top $1...

View Article

Image may be NSFW.
Clik here to view.

German Court: Employees Can Be Held Liable for Damages Caused by CEO Fraud

A German court has ruled that an employee can be held liable for damages caused by instances of CEO fraud that affect their employer. In October 2017, the Regional Labor Court of Saxony ruled that a...

View Article

Image may be NSFW.
Clik here to view.

Why Password Vault Only Solutions Are Not Enough to Stop a Breach

‘Twas the month of Christmas and all through the town, packages ‘round trees were being carefully laid down. But much to the surprise of one neighborhood, their packages were stolen, taken for good!...

View Article


Image may be NSFW.
Clik here to view.

The Year in Review: Rethink Security

During a year of high-profile breaches like Equifax, HBO and Uber, as well as the realization that Yahoo’s highly-publicized 2013 breach compromised the accounts of all three billion of its users, the...

View Article

Image may be NSFW.
Clik here to view.

4 Steps to Reduce the Risk of Shared Account Passwords

Reduce the Risk of a Security Breach When Sharing Privileged Accounts There are partners, employees, contractors, customers and others who access or try to access your most valuable company assets on a...

View Article

Image may be NSFW.
Clik here to view.

4 Months to Go: A New Year GDPR Checklist

As we enter the New Year, IT and security leaders have most likely been glued to revelations of major new CPU-level vulnerabilities Meltdown and Spectre, described by researchers as among the “worst...

View Article


Image may be NSFW.
Clik here to view.

Centrify to Discuss Zero Trust Security at the ICIT 2018 Winter Summit

Following the high-profile breach of the US Office of Personnel Management (OPM), which exposed the personal data of millions of Americans, the House of Representatives’ Committee on Oversight and...

View Article


Image may be NSFW.
Clik here to view.

Escaping Data-Breach Groundhog Day

Countless companies globally are trapped in data breach Groundhog Day, unable to escape a repeating cycle of cyber attacks. In the 2018 Thales Data Threat Report, produced by 451 Research, the key...

View Article

Image may be NSFW.
Clik here to view.

Five Best Practices for Zero Trust Security

The Centrify Zero Trust Security model is effective because it allows organizations to remove trust from the equation entirely. Based on the assumption that untrusted actors already exist inside and...

View Article

Image may be NSFW.
Clik here to view.

Break the Trust and Stop the Breach: The Zero Trust Security Model

As 2018 is upon us, it’s time to take stock of our new realities and commit to better behavior that benefits us and our companies. The discussion of the perimeterless enterprise is not new. In fact,...

View Article

Image may be NSFW.
Clik here to view.

C-Suite Disconnect is Weakening Cybersecurity

Today, Centrify announced a new research study conducted with Dow Jones Customer Intelligence titled, “CEO Disconnect is Weakening Cybersecurity.” The report sheds light on what’s going on inside the...

View Article


Image may be NSFW.
Clik here to view.

Multi-factor Authentication (MFA) Is Ready for Prime Time

We’ve heard it time and again. As security threats increase and morph, and user devices and locations diversify, multi-factor authentication (MFA) should be blossoming into a trusted method for...

View Article

Image may be NSFW.
Clik here to view.

Takeaways from the Russia-Linked US Senate Phishing Attacks

The Zero Trust Security approach could empower organizations and protect their customers in ways that go far beyond typical security concerns. On January 12, 2018, cybersecurity firm Trend Micro...

View Article


Image may be NSFW.
Clik here to view.

Centrify for NIST 800-171 MFA Compliance

I often speak with Federal System Integrators (FSIs) who need to implement Multi-Factor Authentication (MFA) as part of their NIST 800-171 compliance. Specifically section 3.5.3 of this NIST guide...

View Article

Image may be NSFW.
Clik here to view.

Supply Chain Risk: Time to Focus on Partners Ahead of GDPR Deadline

With the GDPR compliance deadline of May 25 almost upon us, recent events have highlighted the importance of locking down third-party risk. Attacks on supply chain partners, Facebook’s data leak...

View Article


Image may be NSFW.
Clik here to view.

It’s Almost GDPR D-Day: So What Happens Next?

Over the past 12 months during this blog series I’ve tried to provide insight into some of the key aspects of the GDPR and how organisations can better prepare for the big compliance deadline day of 25...

View Article

Image may be NSFW.
Clik here to view.

LIVE BLOG: SecurIT Zero Trust Summit

REGISTER BELOW FOR THE LIVE STREAM! Welcome to the live blog from SecurIT: the Zero Trust Summit for CIOs and CISOs. SecurIT is an all-day industry event at Terra Gallery in San Francisco. This blog...

View Article

Image may be NSFW.
Clik here to view.

Cyber Risk Insights from the AIG 2017 Cyber Insurance Review

I read with interest AIG’s 2017 Cyber Insurance Review. In a one sentence summary: cyber insurance claims are up, due to systemic ransomware and wiper malware attacks, the cyber business is booming,...

View Article
Browsing all 144 articles
Browse latest View live