Posts by Ben Rice

Ben Rice is Vice President, Worldwide Business Development. Ben has held a variety of senior management positions at public companies such as Blue Coat Systems and startups such as Egnyte and Ositis Software. He began his career as an attorney working at The Castleman Law Firm, the LA County District Attorney and the Law Offices of Benjamin Z. Rice.

Hot Topics

4 Tips to Stay Safe Online for National Cybersecurity Awareness Month

By , October 3, 2017

Help! I Love the Internet, But My Identity and Data Are Up For Grabs — Should I Just Unplug?! In honor of National Cybersecurity Awareness Month, we at Centrify are doing what we can to help you to be #CyberAware. The theme for the first week is around simple steps to online safety. Have you ever considered how to protect your privacy or identity while “online”? Have you noticed over the last few years how many times your data has been stolen or exposed by hackers? Have you observed that most of these breaches were from systems where you were…

Centrify Perspective

How to Hack Passwords: How Long Would It Take Your Grandmother To Do It?

By , September 13, 2017

(Hint: You Won’t Believe the Answer) My last article “Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)”, was about how hackers can obtain massive databases of human generated passwords and run them through off-the-shelf tools on commodity hardware by using Graphics Card GPUs to gain speed and computing cost advantage. This article will delve into how easy it will be for your grandma to rig up a password cracking machine. First step for Grandma is to visit Amazon and pickup some hardware. Perhaps a nice BitCoin mining rig that can compute…

Centrify Perspective

Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)

By , May 31, 2017

The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can’t help you as 81% of data breaches come from compromised credentials. Lets delve into how easy it is to break into almost any account. Hackers have invented the digital equivalent of a master key. If you look at sites like SecLists, Weakpass, and —  not to mention berzerk0’s probable wordlists on github which is a clever amalgam of password wordlists. Here you will find…

Hot Topics

What’s Next from Google Cloud: Scenes from Google Next

By , March 13, 2017

Google Cloud last week had their big event in San Francisco, gathering Partners, customers and Googlers alike to talk about Google Cloud and its bright future. Centrify was proud to sponsor this event, and we had a presence in the Partner Playground, which allowed us to visit with hundreds of Google Next attendees to understand what they were doing with Google Cloud. Of course we spoke with Centrify customers, Google customers and some prospective customers, but interestingly, most of these conversations were with those who are already using software as a service (SaaS) or identity as a service (IDaaS) today….

Hot Topics

Centrify Supports Data Privacy Day: Take Action Today to Protect Your Privacy!

By , January 27, 2017

Centrify is proud to be a Data Privacy Day Champion because we work tirelessly each day to protect our customers and their data privacy.  We believe that all of us, whether at work or as consumers, should be aware of data privacy issues (who has my data? what can they do with it? what are they doing to protect it?) and take steps to protect personal data and business’s data. So, when we found out we could help champion Data Privacy Day we jumped at the chance. In recognition of Data Privacy Day, Centrify brings various supporting messages about how to keep…

Partner Corner

Centrify Joins Forces with Stop. Think. Connect™

By , October 11, 2016

I am excited to blog about our new association with the global cybersecurity awareness campaign STOP. THINK. CONNECT.™, which teaches digital citizens how to stay safer and securer online. Centrify always looks to align itself with like minded organizations and individuals as part of its global mission to protect companies and their users from cyberthreats. These organizations include the founders of STOP. THINK. CONNECT.: the National Cyber Security Alliance (NCSA), the APWG and the U.S. government, including the White House. The Department of Homeland Security leads the federal engagement in the campaign. Centrify is proud to work with these organizations, as well as the other 700+ members,…

Partner Corner

SIEM Partnerships with IBM, Splunk and HPe Grow Centrify Partnership Ecosystem

By , September 29, 2016

Have you ever wondered what happens to all the information that is generated by computers as they log the activities of users doing things? Every click, every command, every application interaction and every error is recorded as these actions occur. Sometimes these “events” figuratively do go on a road to nowhere… they just sit unanalyzed on a server somewhere waiting to fill up the disk with their eventual growth. The answer to the first sentence is that the information lies in these stacks of data, and that is a problem. As soon as you say problem — here comes software to the…

Centrify Perspective

How to Protect Yourself from a Social Engineering Attack

By , September 20, 2016

Hackers are after you. Not just “you” as a consumer using your devices to shop. Not just “you” as an employee accessing your company network, e-mail or applications. They are after you. The more they know and can readily find out about you, the easier it is to impersonate you for purposes of further compromise. One of the most common ways this happens is through social engineering — psychological manipulation of people into performing actions or divulging confidential information. Social engineering has been around for a long time; in fact, one of the earliest examples cited was the original Trojan Horse made of wood! However,…

Partner Corner

Centrify Brings Secure Identity Data to the Open Network Insight Project

By , July 28, 2016

Centrify has been working with Cloudera for years around our many joint customers and a partnership embracing the product strengths of both companies. Building on this foundation, Cloudera and Centrify today announced that Centrify has joined the Open Network Insight (ONI) project. ONI is an open source, Apache 2.0 licensed cybersecurity project that leverages big data and machine learning to detect advanced threats. ONI provides an open data model for Network, and with the addition of Centrify to the project will be extended to include identity. By extending ONI’s open data model into identity, Centrify is allowing users to centralize identity and…

Centrify Perspective

Centrify Expands It’s Developer Program to Make it Easier to Add MFA, SSO and Access Control to Apps

By , May 24, 2016

Single sign-on, social login, multi-factor authentication (MFA), password reset and access control can now be easily integrated into cloud, mobile and behind the firewall apps from third party developers by integrating Centrify APIs. Application developers are in a modern day wonderland where they can build multifaceted and intricate apps that function across user devices without having to build much computing or coding infrastructure.  It is now taken for granted that developers tap into well known APIs like Twitter, Facebook, Google or eBay to enrich their apps with new layers of context, function and integration. The API economy essentially allows developers to outsource some…