German Court: Employees Can Be Held Liable for Damages Caused by CEO Fraud

A German court has ruled that an employee can be held liable for damages caused by instances of CEO fraud that affect their employer. In October 2017, the Regional Labor Court of Saxony ruled that a financial director can be partially liable for the damage caused by a case of CEO fraud. Their accountability was ultimately limited however, the court found, because the liability privilege developed by German labor courts applies to CEO fraud. Under that common law, employees are responsible for damages only if they demonstrate gross negligence. While the employee did violate their employer’s internal safeguards, the court…

What To Consider While Selecting a Single Endpoint Security Vendor?

Whenever I speak about IT security vendor consolidation, I am encountered by confusion-ridden looks from the business fraternity. Businesses are grappling with the challenge of selecting an appropriate security vendor(s) in such an ever-changing IT environment — zero-ing on single vendor’s capabilities does not appear to be the right approach! Information technology has come a long way, and the development has been paralleled with security considerations. For each IT capability there is a security layer to top it up with. Multiple vendors support is like multiple mini IT Security workshops, running 24×7, following their own innovative trouble shooting when a…

5 Security Tips for Online Shopping in 2017

‘Tis the season of holiday cookies, warm sweaters hot cocoa and… holiday shopping deals. According to Deloitte, retailers can expect to see holiday sales growth as much as 4.5 percent and could top $1 trillion between the months of November and January this year. It’s even looking better for online shopping. “E-commerce sales… are expected to increase 18 to 21 percent during the 2017 holiday season… Digital sales climbed 14.3 percent in 2016” It is certainly looking jolly for the retail industry all around, but with an increase in online shopping, does that mean an increase in cyber threats this…

What is Adaptive Multi-factor Authentication (MFA)?

In 2016 over $80B have been spent on Security, yet 66% of companies were still breached and 81% of breaches involved compromised credentials in the form of either stolen or weak passwords. I covered in one of my previous blogs the cost of protecting yourself, which according to a study by Ponemon Institute in 2015, the mean annualized cost for 58 benchmarked organizations is $15 million per year. So, now that we understand how expensive it is to get hacked (which many of us probably knew along), I want to state the obvious: In today’s IT world, relying on simple…

Centrify Selected as a Box Trust Partner

Over the past few months, it seems Centrify can’t escape the winner’s circle. This all began with positive recognition from revered industry analyst firm Forrester when they positioned Centrify as leaders in both of the Privileged Identity Management and recent IDaaS Waves. In fact, we are the only identity vendor who appears in both Waves, let alone be positioned as leaders in both. The winning streak continues! Centrify is proud to announce that we have been selected to join the Box Trust ecosystem. To show real dedication in keeping their customers’ data safe, Box has assembled a network of hand-selected…

Six Months and Counting: How Standards and Frameworks Can Help GDPR Compliance

The theft of highly sensitive personal information on 57 million Uber drivers and customers in the Uber data breach — and its subsequent cover-up — is in many ways what the GDPR was invented for. Here is a multi-billion dollar US tech company that reportedly protected access to key data in the cloud by using just static log-ins. Not only did its data protection controls therefore fall short of the best practice “state-of-the-art” approach outlined in the GDPR, but the firm also failed to report the incident — something which would incur a fine of €10m (£8.9m) or 2% of…

Hot Off the Press: Forrester Names Centrify a Strong Performer in Enterprise Mobility Management

Yes, you read it correctly. Centrify, the only identity services provider to be evaluated in and positioned as a leader in both The Forrester Wave™: Identity-As-A-Service, Q4 2017 and The Forrester Wave™: Privileged Identity Management, Q3 2016 has also been identified by Forrester as a Strong Performer in The Forrester Wave™:  Enterprise Mobility Management, Q4 2017. A complimentary version of this report is available for download here. Centrify received the highest possible scores in the product vision and mobile identity and access criteria. According to Forrester, “Centrify was the first vendor in the EMM market to unite IDaaS with mobility management…

Centrify Achieves Advanced Partner Status in AWS Partner Network

We are proud to announce that Centrify has met the requirements and is now an Advanced Partner within the AWS Partner Network. Is this just another Partner announcement or is there something more here? What This Means for Customers First, for customers, Centrify becoming an Advanced Technology Partner means that they have been so rigorously tested that AWS personnel can recommend Centrify to AWS customers without reservation. AWS has put Centrify and its products/services through hours of testing and diligence, including talking to customer references, analyzing Centrify’s Identity Services, as well as establishing that Centrify on AWS meets all security…

Six Cybersecurity Questions for the C-Suite

Countless breaches of the past year demonstrate that C-suite executives and company directors must rethink their security. Earlier this year, Equifax saw its share price drop by 13 per cent within a day of revealing a data breach while last year Yahoo suffered a $350 million cut in its sale price to Verizon after reporting data breaches affecting one billion accounts — a number that was later increased to all three billion accounts with critical information stolen, including names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and hashed passwords. The devastation of these incidents, alone,…