barryscott

Posts by Barry Scott

Barry Scott is CTO of EMEA. An industry veteran with over 25 years’ experience working in the Windows, Unix and Linux space helping major organisations in almost every industry vertical. The last 9 years of Barry's career have been spent helping organisations manage their Identity Management and Auditing challenges.


Hot Topics

Time to Ditch Passwords: Taking the Centrify Message to Infosecurity Europe

By , June 6, 2017

London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe show. With over 13,000 visitors expected over the three days, this is one of the biggest industry events around. Centrify will be there on Stand C65 to share why we think our range of advanced identity services are the only way IT leaders can secure their hybrid enterprise against modern threats. Attendees also have a great opportunity to hear first-hand from customer Remy Cointreau on the challenges of becoming a more secure and agile organisation through…

Hot Topics

Data Mapping: A Tricky First Step to GDPR Compliance

By , June 5, 2017

Last Thursday, the one year countdown to GDPR compliance officially began. For those of you still wondering what all the fuss is about, new research commissioned by Centrify has revealed that public companies suffer on average a 5% share price drop immediately following disclosure of the breach. The EU General Data Protection Regulation (GDPR) will ensure there’s no room to hide: as of 25 May 2018, if you’ve been breached you must notify the Supervisory Authority within 72 hours of becoming aware, unless particular circumstances apply. To help organisations figure out a plan of action, Centrify is running a monthly…

Hot Topics

Am I Affected by the European General Data Protection Regulation?

By , May 4, 2017

It’s a year until the biggest shakeup to Europe’s privacy laws in nearly a generation takes effect. The European General Data Protection Regulation (GDPR) will bring sweeping new rules into force, including new consumer rights over how personal data is used, and mandatory 72-hour data breach notifications. Yet there’s still confusion over which companies and what types of data are covered by the law. With firms currently complying with less than 40% of GDPR principles on average, time is running out. That’s why Centrify is running a new monthly blog series designed to raise awareness about the GDPR, as the clock…

Centrify Perspective

Pass(word)ing the buck!

By , February 9, 2017

The start of the New Year is always an interesting time in the security community. Out come the statistics and stories about the worst passwords and the most common ones chosen by online users during the previous year. A recent story in the UK national press suggests that half of all online users worldwide use just 25 passwords between them — and of course, none of the passwords are very secure and hackers could easily crack them. In what seems like Groundhog Day the most common password is once again 123456, followed by 123456789 (so we can assume some popular…

Hot Topics

EU GDPR, Mandatory Data Breach Notification and How Centrify Helps

By , December 1, 2016

Breach notification rules in the upcoming EU GDPR (General Data Protection Regulation) will mean data breaches are far more likely to become public, where today it is possible (although probably ill-advised) to try and sweep them under the carpet. The 2016 Verizon Data Breach Investigations Report stated “63% of confirmed data breaches involved weak, default or stolen passwords.” Centrify protects against the leading point of attack used in data breaches – compromised credentials – and can therefore reduce the risk of breaches taking place. EU GDPR Background The EU GDPR will apply from 25th May 2018, and although that seems like a long time from now, companies may find they…

Hot Topics

5 Critical Topics in Cybersecurity Training

By , October 20, 2016

With European Cybersecurity Month in full swing, this week’s topic of discussion is “Cybersecurity Training.” Whilst cybersecurity training and awareness has undoubtedly improved, a common mistake is that it is often treated as a one-time tick-box exercise, rather than an ongoing process. As cyberthreats become part of the reality of daily business, the limitations of traditional security controls have been exposed and businesses need to recognise that cybersecurity is not simply a one-off task on the to-do list. A security breach is now assumed to be inevitable and whilst layering defensive security controls and tools are a step in the…

It's All About Identity

How Personal is Personal When It Comes to Handing Out Information?

By , July 26, 2016

Recent experiences have made me question just how much information we hand out nowadays to people we barely know. It seems that everyone wants a bit of our personal information, and more often than not we are happy to provide it. Even from my recent experiences selling a flat, it was surprising how much personally identifiable information the estate agent needed to see. I was asked to send all sorts of documents, from passport details to bank statements, often over e-mail. As someone keen to sell a flat, I did it without question of course — we all want the…

It's All About Identity

Why a Simple Password Reset is Not Enough

By , May 9, 2016

Recently, a number of Amazon account holders received e-mails proposing a password reset out of “an abundance of caution.” This was a result of routine monitoring, in which Amazon discovered a list of e-mail addresses and passwords that had been posted online. Whilst the list was not Amazon-related, experience has shown that users regularly re-use their passwords across multiple websites. As such, Amazon sent out e-mails to all users whose addresses and passwords were on the list, with instructions urging a complete password reset. Whilst Amazon itself wasn’t breached, it is certainly noteworthy that its usual surveillance processes unearthed this list…

It's All About Identity

Chain Reaction — Strengthening the Weakest Link with Third Party Identity Management

By , April 7, 2016

Dealing with third parties is an inevitability of modern day business, and so too is the risk of a data breach. Unfortunately, the two often go hand in hand. Organisations are subject to the security of their supply chain, partners and contractors, and need to verify the legitimacy of these third parties. Allowing them external access to your corporate network puts additional strain on IT managers and Sysadmins to maintain business productivity without compromising security. Businesses must incorporate an additional layer of defence in order to protect sensitive corporate data from the threats posed by potentially less security-minded third parties,…

Hot Topics

ABC…Easy as 1-2-3 (When it Comes to Passwords Anyway)

By , February 18, 2016

The new year usually brings new intentions and often changes to old habits. But it seems that old habits die hard, especially when it comes to changing our passwords. According to SplashData’s list of the worst passwords of 2015, it’s the same old story. Highlighting the insecure habits of users, once again ‘123456’ and ‘password’ rank as the most commonly used passwords — just as they have since the company’s first list in 2011. It seems incredible that people continue to put themselves and their personal data at risk, especially after a year of increasingly high profile attacks on consumer…