Hot Topics

Hot Topics

Centrify’s industry experts discuss the biggest issues and hottest topics around the convergence of identity and compliance for data center, cloud and mobile users and applications across devices.


By , August 10, 2017

The recent security breach at HBO of confidential data including Game of Thrones scripts, cast personal details and administrator passwords highlights the vulnerability of password-only protection. The breach involved hackers stealing about 1.5 terabytes of data from HBO systems — more than seven times as much as the 200 gigabytes taken in the 2014 Sony hack — including scripts for five Game of Thrones episodes and two unreleased episodes of Ballers and Room 104. Passwords Alone Are Not Enough to Stop the Breach The hackers have reportedly released numerous confidential documents, including one with a list of personal phone numbers,…

By , July 18, 2017

Centrify teamed up with security researcher Ponemon Institute to survey a large group of IT, information security, senior marketing and communication professionals as well as a healthy number of consumers. A key objective of the study was to get a handle on the financial impact of a cyber security breach on a typical organization. The bottom line (no pun intended) is that, the day the breach makes headlines: Your stock price will drop between an average of 3% to 7% when breach is announced You stand to lose a significant number of your customers You will see a corresponding loss…

By , June 26, 2017

A recent Ponemon Institute study set out to examine the attitudes and perspectives of three key stakeholder populations inside a business environment: Marketing practitioners, IT practitioners and consumers. A key objective of the Centrify-sponsored study was to understand the impact of a data breach on a company’s customers, stock price and overall brand reputation. Among the survey’s key findings: A data breach now outranks a scandal involving the CEO in terms of adverse impact on a company’s reputation. In fact, breaches ranked in the top three most negative events, following shoddy customer service and an environmental incident. Negative Affects on…

By , June 8, 2017

From Yahoo to TalkTalk, and Wonga to Kmart, wherever you look today data breaches dominate the headlines. In fact, organisations are urged to assume it’s a case not of “if” but “when” they’re hit, and plan accordingly. The repercussions could be disastrous: a recent Centrify study revealed that on average share prices tumble 5% following a breach, with a third (31%) of customers discontinuing their relationship with the affected firm. But where do these breaches stem from? Human error has long been pegged as a major contributing factor, so we decided to take a snap poll of attendees at Infosecurity…

By , June 6, 2017

London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe show. With over 13,000 visitors expected over the three days, this is one of the biggest industry events around. Centrify will be there on Stand C65 to share why we think our range of advanced identity services are the only way IT leaders can secure their hybrid enterprise against modern threats. Attendees also have a great opportunity to hear first-hand from customer Remy Cointreau on the challenges of becoming a more secure and agile organisation through…

By , June 5, 2017

Last Thursday, the one year countdown to GDPR compliance officially began. For those of you still wondering what all the fuss is about, new research commissioned by Centrify has revealed that public companies suffer on average a 5% share price drop immediately following disclosure of the breach. The EU General Data Protection Regulation (GDPR) will ensure there’s no room to hide: as of 25 May 2018, if you’ve been breached you must notify the Supervisory Authority within 72 hours of becoming aware, unless particular circumstances apply. To help organisations figure out a plan of action, Centrify is running a monthly…

By , May 15, 2017

Effective cyber risk management starts with the C-suite and belongs in the boardroom Wow, this last Friday and over the weekend we have heard about the massive cyber attack infecting thousands of organizations with ransomware in over 75 countries. In Britain, dozens of hospitals and National Health Service providers were crippled. While the ransomware was only demanding $300 worth of bitcoin the impact of the attack saw thousands of appointments canceled, phone lines down and patients turned away. Today, a brand new Ponemon study, sponsored by Centrify, was released and examines the impact of data breaches on reputation and share…

By , May 9, 2017

Another year has gone by and the words from the 2016 Verizon Data Breach Investigations Report (DBIR) still ring true: “We’re not mad, just disappointed.” The 2017 Verizon Data Breach Investigations Report (DBIR) paints a déjà vu portrait of data breaches where 81% of hacking-related breaches leveraged either stolen and/or weak passwords. You have to hand it to cyber criminals, they are no hacks (pun intended). Much like the flow of water, they find the path of least resistance to their target and today that path is clearly straight through your users and their self-managed “simple factor” passwords. Look at…

By , May 8, 2017

I’ve seen quite a few articles lately on why there aren’t more women in cybersecurity. It’s a good question, but I think to answer that, we have to look at tech in general. First, let’s step back and acknowledge the progress that has been made. Today’s average tech company looks nothing like it did in the 1980s when I was earning a bachelor’s degree in computer science and then later a master’s degree in business. At that time, women working in any roles in technology were a minority. Today, that’s improved in a number of areas within tech including marketing,…

By , May 4, 2017

Yesterday, Google users were targeted by a spear phishing campaign that some cybersecurity researchers believe to be one of the fastest-spreading attacks of its kind in history. This attack was highly effective, as the phishing emails were harder to spot since they were from familiar senders. Most users were likely easily fooled into trusting a message from a known contact, which made this scam easy to spread and propagate quickly. While the hole was quickly patched by Google, it is always prudent to check the URL of a link before clicking on it to verify it is spelled correctly and…