A Ticking Time Bomb: Understanding and Securing the Next Generation of Workers
It’s sometimes easy to forget that the younger employees of today are the managers of tomorrow. If we fail to understand how they use technology and perceive security and privacy, it will have a major...
View ArticleMFA Everywhere: A Tried and True Method in Accelerating Security
While phishing attacks continue to jeopardize today’s organizations (a reported 76% of organizations experienced phishing attacks in 2017), it was refreshing to hear that tech giant Google has...
View ArticleModern Practices: Zero Trust Security
In today’s mobile-first, cloud-first environment, cybersecurity starts with protecting the primary attack vector – privilege identities – with a “never trust, always verify” mindset for Zero Trust...
View ArticleMinimizing Exposure to Ransomware Attacks with Centrify Zero Trust Privilege
Ransomware attacks like the ones that wreaked havoc in Baltimore, Maryland, Albany, New York, and Genesee County, Michigan are dominating the headlines in 2019. Holding someone or something for ransom...
View Article