Posts by Corey Williams

Corey oversees the strategic vision, tactical roadmap and companywide go-to-market plan for Centrify products. Corey is a veteran technology consultant and marketer, with more than 15 years' enterprise software company experience.

Hot Topics

Uh Oh, Yahoo Breach Hits 1 Billion User Accounts

By , December 15, 2016

Could this be the catalyst for change to end hacks? Compromised enterprises face huge barriers to rebuilding customer trust and brand reputation. And for Yahoo, this may be an insurmountable task. In September, Yahoo disclosed that the company lost access control for over 500 million accounts. Turns out the largest breach in history of 500M Yahoo accounts in 2014 is only half as much as the latest and largest hack ever discovered – 1B Yahoo accounts lost in 2013. Will this event finally be the catalyst for not only Yahoo but every other company that maintains customer accounts to force…

Hot Topics

Did a Lack of Common Sense Cybersecurity Just Elect Trump?

By , November 21, 2016

There is little debate that this election will be described as a referendum on the status quo, with very strong anti-establishment and anti-elitist sentiment driving record numbers of unexpected voters to the polls. But that doesn’t tell the complete story. Yes, the Hillary campaign brought the current administration out in force in the final weeks, thus cementing her image as an entrenched Washington insider. But I can’t help but think that this status quo image began to be shaped and hardened as a direct result of the leaked insider communications exposed on WikiLieaks and as a result of the hacked…

From the Cloud

SSO for Cloud-Based Apps a Key to Collaboration Success for Shiseido

By , November 9, 2016

At the end of last year, PC Magazine published an article about the five collaboration trends to expect in 2016. The article stated that, “Distributed teams have more ways than ever to communicate and collaborate in real time, and 2016 is set to bring another wave of innovation around cloud-based connectivity, cross-platform integration, and next-generation multimedia conferencing.” They were pretty accurate. Collaboration between employees and contractors — working from anywhere but the office – is more common every day. And, as the article predicted, “cloud-connected everything” (the #2 trend) and “seamless interoperability” (#4) are the name of the game. But building a truly collaborative…

Hot Topics

Podesta Twitter Hack: A(nother) Lesson on Two-Factor Authentication

By , October 13, 2016

In the midst of the WikiLeaks’ release of thousands of emails purportedly from his inbox, Hillary Clinton Campaign Chairman John Podesta has now become the victim of a hack into his Twitter account. CNN is reporting that Podesta’s account was hacked on Wednesday, September 12, and that, just as Clinton landed in Las Vegas, Podesta ostensibly tweeted, “I’ve switched teams. Vote Trump 2016. Hi pol.” While the specific details of the hack have yet to be discovered, a likely scenario is that Podesta’s Twitter account was protected solely by a username and password – without any form of two-factor authentication….

Hot Topics

Last Hurrah for Yahoo? 500 Million Accounts Compromised

By , September 22, 2016

I have personally been on Yahoo email since it was released in 1997 (almost 20 years!). I remember how cool it was to have an email address that would live independently from my school, work and ISP accounts. This was especially cool because I lived in Silicon Valley and all three of those emails tended to change every few years. I have been a loyal user of Yahoo mail even when seemingly better or more popular alternatives were available (Gmail, AOL,, Hotmail, etc.). Well, today is the day that I may finally consider making the move to another service. Turns out…

Hot Topics

Russian Hackers Target World Anti-Doping Agency in Latest Breach

By , September 15, 2016

What Happened: A Russian cyber espionage group known by the name of Tsar Team, also calling itself Fancy Bear, were successful in illegally hacking the World Anti-Doping Agency (WADA). The Anti-Doping Administration and Management System (ADAMS) database was accessed using a compromised account provided to the International Olympic Committee for the Rio 2016 Games. A release by WADA indicates, “While it is an evolving situation, at present, we believe that access to ADAMS was obtained through spear phishing of email accounts.” Olivier Niggli, Director General, WADA states, “WADA has been informed by law enforcement authorities that these attacks are originating…

Hot Topics

Top 3 Takeaways from the 2016 Cyber Security Study by Wells Fargo Insurance

By , September 12, 2016

Wells Fargo Insurance released their 2016 Cyber Security Study this week. Over 100 decision makers at companies with at least $100 million in annual revenue were surveyed to better understand perceptions of network security and data privacy vulnerabilities and related business exposures and risks. Three interesting takeaways from this study include: Takeaway #1: The Rise of Imposter Fraud Whether you call it CEO fraud, fraudulent inducement, social engineering fraud or business e-mail compromise scams, 21% of respondents have been targets of impostor fraud. Unfortunately, most suffered a financial loss, and often a significant one ($500k+). In fact, in April 2016,…

It's All About Identity

Securing Enterprise Identities For Dummies: Free Live Webinar

By , September 1, 2016

In previous blogs, “Securing Enterprise Identities For Dummies, Part One and Part Two,” I wrote extensively about how identity can provide a new layer of security for your organization. Identity can be a powerful security tool for protecting both end-users and privileged users from the leading cause of data breaches — compromised credentials. Implementing an identity platform for both identity as a service and privileged identity management can add a strong player security for your organization. In Part One, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure, which are increasingly cloud and mobile. We also…

Hot Topics

What Pokémon Go Teaches Us About Reducing Cyber Risk in the Enterprise

By , August 4, 2016

Pokémon Go is all the rage with my three kids: a tween, a teen and a young adult. At first I didn’t get the appeal. I would ask them, “What is the point of Pokémon?” And, they would answer, “Daaaad, you capture Pokémon with Poké Balls and there are ultra-rare ones like the Squirtle or the Mewtwo and you get berries and level them …(I sorta glaze over at this point).” Am I just being curmudgeonly (and, can you be curmudgeonly in your forties?), or could my kids break it down for me in a way that I would more easily relate…

It's All About Identity

Raise a Glass: Rémy Cointreau Chooses Centrify to Enable Secure Access to Apps from Any Device, Anywhere in the World

By , July 19, 2016

When it comes to some of the world’s finest Cognac and spirits, many of us turn to offerings from Rémy Cointreau. As one of the world’s leading alcoholic beverage brands, Rémy Cointreau employs 1,800 people all over the world and has more than $1 billion in annual sales. Rémy Cointreau recently chose Centrify to enable secure access to apps from any device, anywhere in the world.  When Chief Technology Officer Sébastien Huet joined Rémy Cointreau in 2015, one of his primary objectives was to help transform the company into a more agile organization. A key component of that transition would be…