Reflecting on Centrify’s Rethink Security Approach

In the last 12 months, Centrify is the only company to be acknowledged for it’s  vision and leadership in the Gartner Magic Quadrant for Identity and Access Management-as-a-Service,  The Forrester Wave: Privileged Identity Management, and in the Gartner Critical Capabilities for IDaaS Research for Workforce to SaaS, 2016. These acknowledgements demonstrate our growing influence in the industry with a unique point of view for customers who recognize the increased value in securing access for all enterprise identities in one, built from the ground up platform vs. the point solutions offered by others in the industry. Our mantra has been and…

The Multi-factor Authentication (MFA) Debate

A recent FCW article authored by Derek Handova provides expert opinions from experienced and well respected “identity” professionals: Paul Grassi, Sr. Standards & Technology Adviser at NIST, Jeremy Grant former Sr. Executive Advisor for Identity Management at NIST and now Venable’s managing director for technology business strategy.  Mr. Terry Halvorsen, former CIO for the Department of Defense and Army Col. Tom Clancy, Identity and Asset Management lead for the Department of Defense CIO’s office also provide their thoughts and ideas regarding multi-factor authentication. Their comments, along with other industry experts interviewed by Handova, were thoughtful and worth keeping in mind…

Game of Thrones Hack: Winter Has Come for Passwords

The recent security breach at HBO of confidential data including Game of Thrones scripts, cast personal details and administrator passwords highlights the vulnerability of password-only protection. The breach involved hackers stealing about 1.5 terabytes of data from HBO systems — more than seven times as much as the 200 gigabytes taken in the 2014 Sony hack — including scripts for five Game of Thrones episodes and two unreleased episodes of Ballers and Room 104. Passwords Alone Are Not Enough to Stop the Breach The hackers have reportedly released numerous confidential documents, including one with a list of personal phone numbers,…

Is It Time for a Mac Attack?

After years of successfully dodging the vast majority of viruses, spyware, ransomware and other malware typically directed at PCs, it seems that Mac may be nearing the critical mass necessary to attract cyberthieves. It’s definitely getting closer. According to AppleInsider, “In the fourth quarter of 2016, Apple saw a 4.5 percent increase in shipments…as the wider PC market fell further into the red.” To put it simply, Macs are becoming more popular, and that shouldn’t come as a surprise. Visit your local coffee house and you’ll probably find the vast majority of patrons are sipping their lattes while staring into…

Driving Cloud-Based Agility at Rémy Cointreau with Centrify

Business requirements and information security priorities have always had a tough time aligning. It’s even become something of a cliché these days to say that security is a block on agility, productivity and growth. Yet it doesn’t have to be that way. Rémy Cointreau’s recent collaboration with Centrify is a great example of how, when implemented correctly, security can actually support the business: in this instance, our move to a more agile, cloud-based infrastructure.  On the opening day of Infosecurity Europe in London, I explained to a packed audience exactly how the Centrify Identity Service is helping our employees work…

Infosecurity Europe 2017: Workplace Distraction Is a Major Security Risk, So What Can We Do About It?

From Yahoo to TalkTalk, and Wonga to Kmart, wherever you look today data breaches dominate the headlines. In fact, organisations are urged to assume it’s a case not of “if” but “when” they’re hit, and plan accordingly. The repercussions could be disastrous: a recent Centrify study revealed that on average share prices tumble 5% following a breach, with a third (31%) of customers discontinuing their relationship with the affected firm. But where do these breaches stem from? Human error has long been pegged as a major contributing factor, so we decided to take a snap poll of attendees at Infosecurity…

Time to Ditch Passwords: Taking the Centrify Message to Infosecurity Europe

London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe show. With over 13,000 visitors expected over the three days, this is one of the biggest industry events around. Centrify will be there on Stand C65 to share why we think our range of advanced identity services are the only way IT leaders can secure their hybrid enterprise against modern threats. Attendees also have a great opportunity to hear first-hand from customer Remy Cointreau on the challenges of becoming a more secure and agile organisation through…

Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)

The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can’t help you as 81% of data breaches come from compromised credentials. Lets delve into how easy it is to break into almost any account. Hackers have invented the digital equivalent of a master key. If you look at sites like SecLists, Weakpass, and Hashes.org —  not to mention berzerk0’s probable wordlists on github which is a clever amalgam of password wordlists. Here you will find…