RSA: Centrify Survey Reveals Almost Half of Respondents Lack Confidence in Their Company’s Cybersecurity Strategies

Yesterday, we conducted an onsite survey of IT professionals attending the RSA Conference, being held this week at Moscone Center, San Francisco. The poll asked respondents how their companies secure applications and infrastructures in the age of access, and it revealed that only slightly more than half (55%) believe their company’s current technology investment ensures their company’s cybersecurity. This leaves about half of respondents with a lack of confidence in their own organization’s corporate security! While this fact is startling, it shouldn’t be too surprising, since a recent Forrester study, commissioned by Centrify, confirms that in the past two years, two-thirds…

National Cyber Security Centre Opens: Why UK Firms Need to Rethink IAM

Today the UK’s National Cyber Security Centre (NCSC) opened to great fanfare. But it will have its work cut out to fulfil its mission of making the UK “the safest place to live and work online.” UK organisations of all shapes and sizes are under continual attack – whether from state-sponsored spies, hacktivists or financially motivated cyber gangs. So this is a great chance to marshal our response and make sure we are all able to take advantage of what NCSC boss Ciaran Martin has called a “new era of online opportunity.” Organisations should use the occasion to revisit and reinvigorate…

The Cybersecurity Tipping Point Nears

If we’d take a moment to pull our heads out of the sand and look around, we’d quickly see that we’re on an ominous trajectory. There’s no arguing that over the last several years, we’ve been suffering from increasing numbers of breaches, cyberhacks and data leaks. What’s truly puzzling is the fact that we’ve grown so used to the headlines, they no longer seem to impact us: Target spent $250 million to manage a breach? A massive 1 terabytes per second attack against a DNS provider that knocks out major websites? One billion Yahoo identities hacked? Even a hacked election?…

A Leader in the 2016 Forrester PIM Wave: What It Means for IT Security Teams

Little has changed in 30 years of massive data breaches From the earliest computer hackers to today’s sophisticated cyber-criminals, little has changed in the modus operandi used to access and monetize financial data. In the TRW 1984 incident, thieves stole access codes to a credit rating database from a TRW subscriber, a Sears and Roebuck’s store in Sacramento. They proceeded to paste them to an online noticeboard, so that others with personal computers could use the stolen credit history information of 90 million Americans to commit credit card fraud. Today, privileged user’s credentials are still the preferred target for cyber…

Misuse of Privileged Credentials Now Involved in 80% of Data Breaches

Recently the respected analyst firm Forrester released its “Wave” for the privileged identity management (PIM) market. Centrify is quite proud to be recognized as a leader in the Forrester Wave (in fact we are the “furthest to the right”), and you can request a complimentary copy of the report here and see our analysis of the report here. But, what really jumped out at me was that the report documented how pervasive the misuse of privileged credentials are in data breaches. In this blog I will discuss what PIM is, what are some of the key findings of the Forrester report…

Centrify named a Leader in the Forrester Research, Inc. “The Forrester Wave™: Privileged Identity Management, Q3 2016

Today Forrester Research, Inc. released “The Forrester Wave™: Privileged Identity Management, Q3 2016.” And I am incredibly excited to tell the world that Centrify has been named a Leader by Forrester. My belief is that our placement in the Leaders’ wave combined with our achieving the highest strategy score in the evaluation, validates our truly unique solution that secures privileged access to hybrid infrastructure and apps for all users. Click here for a complimentary copy of the full report. The authors recognized several key trends in the industry, including the growing support for PIM in the cloud and for PIM from the…