Posts by Corey Williams

Corey oversees the strategic vision, tactical roadmap and companywide go-to-market plan for Centrify products. Corey is a veteran technology consultant and marketer, with more than 15 years' enterprise software company experience.


Hot Topics

How the Uber Data Breach Could Have Been Prevented

By , November 21, 2017

Background on the Uber Breach History is replete with examples of individuals and organizations turning manageable problems into serious crises simply by trying to hide the truth. While the Uber data breach was large in terms of the 57M customer and driver records lost, if Uber had followed standard breach protocol by notifying authorities and impacted users, remediated the problem and laid out steps that they were taking to avoid future breaches, the impact would have been much less. Uber was under a legal obligation to notify regulators and to the impacted users and drivers. Instead they took extreme measures…

Hot Topics

A Leader! Forrester Wave Names Centrify Leader For Identity-as-a-Service

By , November 17, 2017

Today Forrester Research released The Forrester Wave™: Identity-As-A-Service, Q4 2017. Evaluating the “seven vendors that matter”, Forrester named Centrify a Leader. Here at Centrify, we believe this is a strong validation of Centrify’s zero-trust approach to securing access to apps and systems. A complimentary version of this report is available for download here. Centrify provides the industry’s only single platform to secure each user’s access to apps and infrastructure through the power of identity services. With this recent report from Forrester, Centrify becomes the only identity services provider to be evaluated in and positioned as a leader in both IDaaS…

Hot Topics

Bad Rabbit Ransomware: Another Wake-Up Call For Organizations

By , October 25, 2017

Aside from the cool sounding name, the Bad Rabbit Ransomware has quickly become a problem across Russia and Eastern Europe. While not as many are being affected as with WannaCry or Petya, it is still causing headaches for hundreds of organizations. Ransomware is a particularly nasty type of cyber-attack that costs far more than the relatively minor payouts demanded. For example, as we have seen with WannaCry, certain organizations are particularly vulnerable to ransomware such as healthcare. Disruption of patient care, destruction of data and general disorder caused by a ransomware attack is felt particularly hard by targeted healthcare organizations….

Hot Topics

Today’s Predictions for Tomorrow’s Internet: How To Keep Your Smart Devices Safe

By , October 19, 2017

When you first hire a personal assistant, they’re not all that helpful. Over time, they learn your daily routine, your needs and desires, and with that information, they make your life easier. Now, consider that your smart phone has morphed into your own mini personal assistant. Today’s smartphones are filled with potent sensors that collect data about you. Audio and image sensors, touch sensors, acceleration sensors, light, proximity, and location sensors all help your smartphone to get to know you and your habits. It knows where you go, when you go and how long you stay. It knows who you…

Hot Topics

Yahoo Security Breach Take 3 (Billion Users That Is)

By , October 4, 2017

Remember that Yahoo breach last year, how it became the largest breach in history impacted over 1 billion users and knocked $350 million dollars off of the Verizon acquisition price? Turns out that EVERY account at Yahoo! including email, Tumblr, Fantasy and Flickr were impacted by the breach. That’s all 3 billion accounts vs just the 1 billion that were announced last year. Oath, the new brand for Yahoo, AOL and some other properties at Verizon issued a press release stating “The company recently obtained new intelligence and now believes…that all Yahoo user accounts were affected by the August 2013 theft.” This is…

It's All About Identity

Centrify named “Overall Leader” in KuppingerCole IDaaS Leadership Compass

By , July 6, 2017

Centrify is pleased to announce that KuppingerCole Identity as a Service (IDaaS) Leadership Compass Report names Centrify “Overall Leader.” The report also highlights Centrify’s leadership in innovation, product features and market reach. KuppingerCole is a leading analyst covering Identity and Access Management (IAM). This report is the most current and comprehensive look at the IDaaS market, which is one of the fastest growing segments in the Security and Identity markets. According to Jeff Edwards of Solutions Review, The IDaaS market is exploding and it is predicted “that by 2020, 40 percent of IAM purchases will use the IDaaS delivery model,…

Centrify Perspective

Centrify named a Visionary in brand new Gartner Access Management Magic Quadrant

By , June 10, 2017

Centrify has been identified by Gartner, Inc. as a visionary in the 2017 Magic Quadrant for Access Management. Centrify received the honor for our ability to execute and our completeness of vision, which is evaluated based on a deep understanding of the industry, product innovation, and marketing, sales, and geographic strategy. At a time when cyber breaches are rising in volume and velocity, Centrify represents a massive rethink of security. It is the only complete platform that stops breaches through a trifecta of Identity Services for applications, endpoints and infrastructure — both on premises and in the cloud. Unlike other…

Hot Topics

Impact of Data Breaches on Reputation & Share Value (Hint: it’s HUGE)

By , May 15, 2017

Effective cyber risk management starts with the C-suite and belongs in the boardroom Wow, this last Friday and over the weekend we have heard about the massive cyber attack infecting thousands of organizations with ransomware in over 75 countries. In Britain, dozens of hospitals and National Health Service providers were crippled. While the ransomware was only demanding $300 worth of bitcoin the impact of the attack saw thousands of appointments canceled, phone lines down and patients turned away. Today, a brand new Ponemon study, sponsored by Centrify, was released and examines the impact of data breaches on reputation and share…

Hot Topics

Déjà vu! Verizon Reports Compromised Credentials Are (by far) the Leading Cause of Breaches

By , May 9, 2017

Another year has gone by and the words from the 2016 Verizon Data Breach Investigations Report (DBIR) still ring true: “We’re not mad, just disappointed.” The 2017 Verizon Data Breach Investigations Report (DBIR) paints a déjà vu portrait of data breaches where 81% of hacking-related breaches leveraged either stolen and/or weak passwords. You have to hand it to cyber criminals, they are no hacks (pun intended). Much like the flow of water, they find the path of least resistance to their target and today that path is clearly straight through your users and their self-managed “simple factor” passwords. Look at…

Hot Topics

Don’t Open that Google Doc Link: Another Phishing Scam

By , May 4, 2017

Yesterday, Google users were targeted by a spear phishing campaign that some cybersecurity researchers believe to be one of the fastest-spreading attacks of its kind in history. This attack was highly effective, as the phishing emails were harder to spot since they were from familiar senders. Most users were likely easily fooled into trusting a message from a known contact, which made this scam easy to spread and propagate quickly. While the hole was quickly patched by Google, it is always prudent to check the URL of a link before clicking on it to verify it is spelled correctly and…