Posts by Brian Krause

Brian Krause is an experienced (16 year) Channel Executive that specializes in assisting partners with building-out security practices and go to market strategies.

Hot Topics

3 Ways to Prove Identity & Combat Cybercrime: National Cybersecurity Awareness Month

By , October 19, 2016

The Secret to Security What if I told you that the secret to security was just one, simple and attainable thing? Fort Knox is the de facto standard of security. It has granite walls that are four feet thick, vaults housing gold constructed with 27 inches of steel and one of the largest surveillance network on earth. Not to mention, it has the U.S. Army guarding the facility.  Yet, there is “one thing” that really helps protect this compound. Area 51 is one of the most highly classified areas in the world. Its protective measures include elaborate fences, an actual army of…

From the Cloud

Cloudbound? How to Secure Your Migration to AWS

By , July 14, 2016

I’ve always enjoyed hearing grand stories of moving workloads to the cloud. This allows sharing resources you no longer have to manage and you gain access to all the processing power needed to finish jobs in an efficient manner. The best part is that you pay only for what you use. This explains Amazon Web Services (AWS) Elastic Compute Cloud (EC2) success.  In simple terms, move workloads to the cloud and you’ll be happy! This is awesome — yet, there is one question I often have. How will you secure this? Verizon’s 2016 Data Breach Investigations Report states 63% of data breaches involve compromised passwords. Amazon knows this and has done a fine job of building a…

Hot Topics

Bank Robbery and Ransomware Prevention Have This in Common

By , June 30, 2016

Imagine you are getting ready to commit a bank heist. You dress up in black and put on your Richard Nixon mask. You approach an area in the side ally, at night, where surveillance cameras don’t have a visual on a window. You grab your circle glass cutter and create an entrance. By stepping in, you have breached the bank. Glory and fortune are within your fingertips. Reality is about to hit like a ton of bricks. Banks protect their assets by using a layered defense and the least privilege principal. Layers are often vaults within vaults. The area where tellers sit is more secure than the lobby,…

It's All About Identity

The End of VPN as We Know It

By , May 31, 2016

There are countless articles outlining the dangers of VPN and how this is a prime attack vector used by hackers. In an interesting article I was sent recently, Only a third of companies know how many vendors access their systems, it is stated “the average company’s network is accessed by 89 different vendors every week.” This year’s Mandiant m-Trends 2016 Report, see subtitle page 23, recommends: “Don’t give your outsourced service provider a site-to-site tunnel. Give them access to only the application or device they need. Make them use multi-factor authentication.”  Now consider over 3.7 billion records have been stolen…

Centrify Perspective

Cybersecurity Best Practices in 2016 — Start by Securing Your Identity

By , April 21, 2016

Each year the folks at FireEye release the M-Trends report compiled by their Mandiant Consulting arm. This outlines what last year’s IT security trends were and what we should anticipate in the coming year. While this year’s M-Trends 2016 validates what many of us have experienced firsthand, it really brings to the forefront how critically important securing identity will be this year. Within the 48-page report, there are 21 sections directly related to identity. Not to mention, a few infographics that invoke identity questions. After taking out the filler pages, identity is mentioned in almost every page. It will be…